CN108091005A - access control system and access control management method - Google Patents
access control system and access control management method Download PDFInfo
- Publication number
- CN108091005A CN108091005A CN201611026846.8A CN201611026846A CN108091005A CN 108091005 A CN108091005 A CN 108091005A CN 201611026846 A CN201611026846 A CN 201611026846A CN 108091005 A CN108091005 A CN 108091005A
- Authority
- CN
- China
- Prior art keywords
- gate
- identification information
- area
- entrance guard
- guard device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00968—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys shape of the data carrier
- G07C2009/00976—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys shape of the data carrier card
Abstract
The present invention provides a kind of access control system and access control management method, the access control system includes the first gate, the first entrance guard device, the second gate and the second entrance guard device.First gate locating is between first area and second area, and the second gate locating is between second area and the 3rd region.First entrance guard device is to judge whether the first identification information inputted from first area meets the first preset value, when the first identification information meets the first preset value, then controls the first gate to open.Second entrance guard device is to judge whether the second identification information inputted from second area meets the second preset value, when the second identification information meets the second preset value, then controls the second gate to open.
Description
Technical field
The present invention relates to access control system and access control management method, more particularly to a kind of entrance guard managements using double-gate
System and access control management method.
Background technology
In known access control management method, typically through the access card that is shown of identification user, as whether
The basis that user is allowed to pass through.
However, only by access card come as current voucher, there are still have managerial loophole.For example, access card can
It can be usurped by other people.Also or it is that when a certain user, which holds access card, is authorized to current, and other personages may also take advantage of
Machine retinue passes through gate inhibition's control.Thus, doubt for security will be caused.
The content of the invention
In view of upper, a kind of access control system of present invention offer and access control management method, so as to solving the above problems.
The present invention proposes a kind of access control system, including one first gate, one first entrance guard device, one second gate with
And one second entrance guard device.First gate locating is between a first area and a second area.First entrance guard device is sentencing
Whether disconnected one first identification information inputted from first area meets one first preset value, when the first identification information meets first
During preset value, then the first gate is controlled when the first identification information does not meet the first preset value, then to control the first gate to open
To close.Second gate locating is between second area and one the 3rd region.Second entrance guard device is judging from second area
Whether one second identification information inputted meets one second preset value, when the second identification information meets the second preset value, then
The second gate is controlled to open, when the second identification information does not meet the second preset value, then controls the second gate to close.Its
In, the first gate initial preset is closes, and the second gate initial preset is closing.
In an embodiment of the present invention, the first entrance guard device further determines whether to receive the first identification information, when not connecing
When receiving the first identification information, then the first gate is controlled to close, when receiving the first identification information, then monitors first area, with
Capture one first auxiliary information.
In an alternative embodiment of the invention, the second entrance guard device further determines whether to receive the second identification information, when not
When receiving the second identification information, then the second gate is controlled to close, when receiving the second identification information, then monitors second area,
To capture one second auxiliary information.
In an alternative embodiment of the invention, it is auxiliary to determine whether the second auxiliary information meets first for the second entrance guard device
Supplementary information, when the second auxiliary information meets the first auxiliary information, then the second entrance guard device controls the second gate to open, when the
When two auxiliary informations do not meet the first auxiliary information, then the second entrance guard device controls the second gate to close, and the first gate inhibition fills
It puts and controls the first gate to close.
In an alternative embodiment of the invention, when the second auxiliary information does not meet the first auxiliary information, then the second gate inhibition fills
It puts and further sends a circular message to a security monitoring unit.
In an alternative embodiment of the invention, the first identification information is to input the first entrance guard device through an access card.
In an alternative embodiment of the invention, the second identification information includes an at least biological characteristic.
The present invention provides a kind of access control management method, suitable for one first gate and one second gate, the first gate locating
Between a first area and a second area, the second gate locating is between second area and one the 3rd region, the gate inhibition
Management method comprises the following steps.It is default whether one first identification information for judging to be inputted from first area meets one first
Value.When the first identification information meets the first preset value, then the first gate is controlled to open.When the first identification information does not meet
During one preset value, then the first gate is controlled to close.Whether one second identification information for judging to be inputted from second area meets
One second preset value.When the second identification information meets the second preset value, then the second gate is controlled to open.When the second identification letter
When breath does not meet the second preset value, then the second gate is controlled to close.Wherein, the first gate initial preset is to close, and second
Gate initial preset is closing.
As described above, the present invention carrys out the first identification to access card respectively through the first entrance guard device and the second entrance guard device
Information verified with the second identification information of corresponding user's biological characteristic, so as to opening for the first gate of control and the second gate
It opens or closed state.Thus, you can access card is avoided to be usurped by other people, promotes the security in entrance guard management.
In one embodiment, the first auxiliary information and the second auxiliary of sensing letter from second area are further sensed from first area
Breath, whether there is so as to auxiliary judgment has suspicious personage beyond user with entering, to solve the loophole in entrance guard management.
Above is to demonstrate and explain this hair on the explanation of this disclosure and the explanation of following embodiment
Bright spirit and principle, and the patent claim for providing the present invention is further explained.
Description of the drawings
Figure 1A~1C is the schematic diagram according to the running of the access control system of one embodiment of the invention.
Fig. 1 D~1E are the schematic diagram according to the running of the access control system of another embodiment of the present invention.
Fig. 2 is the flow chart according to the access control management method of one embodiment of the invention.
In figure:
A1~A3:Region
10:Access control system
110:First gate
120:Second gate
130:First entrance guard device
140:Second entrance guard device
20:User
30:Suspicious personage
S210~S260:The step of access control management method
Specific embodiment
The detailed features and advantage of the narration present invention in detail in embodiments below, content are enough to make any to be familiar with
The technology contents that relevant art understands the present invention are simultaneously implemented according to this, and content according to disclosed by this specification, apply for a patent
Scope and schema, it is any to be familiar with relevant art and be readily understood upon the relevant purpose of the present invention and advantage.Following embodiment
It is the viewpoint that the present invention is further described, but it is non-anyways to limit scope of the invention.
Figure 1A~1C is the schematic diagram according to the running of the access control system 10 of one embodiment of the invention.Such as Figure 1A~1C
Shown, access control system 10 includes one first gate 110, one second gate 120, one first entrance guard device 130 and one the
Two entrance guard devices 140.First entrance guard device 130 couples the first gate 110.The second gate 120 of second entrance guard device 140 coupling with
First entrance guard device 130.
First gate 110 is arranged between first area A1 and second area A2.First gate 110 can be in off position
Switch between opening.For example, the first gate 110 can be automatically-controlled door or other can be used to selectively
The current device of limitation.And when the first gate 110 is opens, then the user of first area A1 is allowed to pass through to the secondth area
Domain A2.Conversely, when the first gate 110 is closes, then the user of first area A1 cannot be introduced into second area A2.
Second gate 120 is arranged between second area A2 and the 3rd region A3.Second gate 120 can be in off position
Switch between opening.For example, the second gate 120 can be another automatically-controlled door or other can be used to select
Limit current device to property.And when the second gate 120 is opens, then the user for having been enter into second area A2 is allowed to lead to
It goes to the 3rd region A3.Conversely, when the second gate 120 is closes, then do not allow to have been enter into the user of second area A2 after
It is continuous to pass through to the 3rd region A3.
In embodiments of the present invention, 110 initial preset of the first gate is closes, and also initial preset is the second gate 120
It closes, as shown in Figure 1A.However in another embodiment, the first gate 110 and the second gate 120 are also predeterminable in other shapes
State is not any limitation as herein.
For example, the 3rd region A3 can be office, and user need to sequentially lead to before the 3rd region A3 is entered
Cross the first gate 110 and the second gate 120.
First entrance guard device 130 is judging whether one first identification information inputted from first area A1 meets one
One preset value.For example, first identification information can the person of including the use of personal information, as user employee compile
Number.First preset value may include the permission of user and shift report or the open hour table of office etc..
In an embodiment of the present invention, first identification information is to input the first entrance guard device through an access card
130.For example, the access card can have the function of near-field communication (Near Field Communication, NFC) work(
The card of energy or radio-frequency discriminating (Radio Frequency IDentification, RFID) function, also or is other types
Contactless card, be not any limitation as herein.Correspondingly, the first entrance guard device 130 can have with functions such as corresponding NFC or RFID
Element, to receive the first identification information.
In an alternative embodiment of the invention, user can also input the first identification information through other electronic devices.
For example, user (can ring through intelligent mobile phone to export the two-dimensional bar with the first identification information as quick
Answer square matrix code (Quick Response Code)), it is not also any limitation as herein.Correspondingly, the first entrance guard device 130 can have
There is the element of image scanning function.
When the first identification information meets the first preset value, then the first entrance guard device 130 controls the first gate 110 to open
It opens.When the first identification information does not meet the first preset value, then the first entrance guard device 130 controls the first gate 110 to close.It lifts
For example, when the first entrance guard device 130, differentiation user 20 is not to swipe the card in normal workday, then still closes the first gate
110.When the first entrance guard device 130 differentiates that the permission corresponding to the employee number of user 20 is can be allowed to enter in holiday
During office, then the first gate 110 can be opened, user 20 to be allowed to be introduced into next verification area, i.e. second area A2, such as schemed
Shown in 1B.
In an embodiment of the present invention, the first gate 110 can have multiple openings.For example, the first gate
110 the first opening can correspond to the first width, for example, only allow just user 20 by width.First gate 110
The second opening then can be to should be greater than the second width of the first width, in addition e.g. permissible user 20 carries it again
The width of his cargo or cart.First opening or the second opening can be corresponded to corresponding to the employee number of user 20
Permission.For example, the permission of engineer can be corresponded to the first width, and the permission of shipping worker can be then corresponded to second wide
Degree.In an alternative embodiment of the invention, above-mentioned multiple openings can be also corresponded to different cycles opening time.
Second entrance guard device 140 is judging whether the second identification information inputted from second area A2 meets one second
Preset value when the second identification information meets the second preset value, then controls the second gate 120 to open.When the second identification information
When not meeting the second preset value, then the second gate 120 is controlled to close.In an embodiment of the present invention, the second gate 120 also may be used
With with multiple openings, as described above.
In an embodiment of the present invention, second identification information includes an at least biological characteristic.For example, in order to keep away
The access card for exempting from user 20 is usurped, and the biological characteristic of user 20 can be further captured in second area A2.It is described
Biological characteristic for example can be the either other features of fingerprint characteristic, iris feature, image of face feature, not limited herein
System.Correspondingly, the second preset value can include fingerprint characteristic, iris feature or the face's shadow of the user 20 recorded in advance
As feature etc..Second entrance guard device 140 can have to picking up fingerprint feature, iris feature, image of face feature or other lifes
The counter element of object feature.
For example, when the second entrance guard device 140 is through comparing, the biological characteristic of the user 20 captured has been remembered really
It records in database, then can further open the second gate 120, the office of the 3rd region A3 is entered with authorized user 20
In, as shown in Figure 1 C.If conversely, captured biological characteristic can not recognize, the second gate 120 is not turned on.
Fig. 1 D~1E are the schematic diagram according to the running of the access control system 10 of another embodiment of the present invention.
In an embodiment of the present invention, the first entrance guard device 130 can further determine whether to receive the first identification information.When
When not receiving the first identification information, then the first gate 110 is controlled to close.When receiving the first identification information, then first is monitored
Region A1, to capture one first auxiliary information.
In addition, when the first entrance guard device 130 judges that the first identification information meets the first preset value and opens the first gate 110
Afterwards, the second entrance guard device 140 can further determine whether to receive the second identification information.When not receiving the second identification information,
The second gate 120 is then controlled to close.When receiving the second identification information, then second area A2 is monitored, it is auxiliary to capture one second
Supplementary information.
For example, the first entrance guard device 130 can additionally configure one first weight sensor (not illustrating).And described first
Auxiliary information can be the weight measured by the first weight sensor from first area A1.And the second entrance guard device 130 also can volume
One second weight sensor (not illustrating) of outer configuration.And second auxiliary information can be the second weight sensor from the secondth area
Weight measured by the A2 of domain.
Then, the second entrance guard device 140 can determine whether the second auxiliary information meets the first auxiliary information.When
When two auxiliary informations meet the first auxiliary information, then the second entrance guard device 140 controls the second gate 120 to open, when second auxiliary
When supplementary information does not meet the first auxiliary information, then the second entrance guard device 140 controls the second gate 120 to close, and the first gate inhibition
Device 130 controls the first gate 110 to close.
In order to avoid while user 20 holds access card and is authorized to current first gate 110, there are another personages
30, which also accompany, has passed through first of certification, in this embodiment, can compare previously from the weight measured by the A1 of first area, be
It is no identical later from the weight measured by second area A2.When another personage 30 take advantage of the occasion retinue by the first gate 110 and
After entering second area A2, then the second entrance guard device 140 can judge the first auxiliary information measured by priority and the
Two auxiliary informations are inconsistent, without being continued on the second gate 120.That is, when the second entrance guard device 140 is subsequently sentenced
Fixed second identification information may conform to the second preset value, but since there may be another outside user in second area A2 at this time
Personage 30, therefore the second gate 120 still will not be opened, as shown in figure iD.
Also, therefore the first gate 110 originally opened can also close.In embodiments of the present invention, when the second lock
Door 120 is closes, and the first gate 110 is when closing, then the space corresponding to second area A2 is a confined space.Namely
It says, when the second entrance guard device 140 is judged in second area A2 there may be during another personage 30 outside user 20, in order to keep away
Exempt from suspicious personage 30 to escape, suspicious personage 30 can be trapped in second area A2 by closable first gate, 110 and second gate 120
Among, as referring to figure 1E.
In the above-described embodiments, the weight sensed respectively on first area A1 and second area A2 is can pass through, to obtain the
One auxiliary information and the second auxiliary information.However in another embodiment, image identification either other technologies are also can pass through to come
It realizes, is not any limitation as herein.For example, the first entrance guard device 130 and the second entrance guard device 140 can additionally set image
Sensing element, and the first auxiliary information can be captured from first area A1 and second area A2 respectively with the second auxiliary information
After obtaining image, by the number of person acquired by image identification technology.When the first entrance guard device 130 judges first area A1's
When number of person is more than 1, then the first gate 110 can not be opened.Either when the second entrance guard device 140 judges second area A2
Number of person be more than 1 when, then the second gate 120 is not opened, and the first gate 110 can be closed once again.
In addition, in embodiments of the present invention, when the second auxiliary information does not meet the first auxiliary information, then the second gate inhibition fills
It puts 140 and further sends a circular message to a security monitoring unit.Security monitoring unit for example can be local police station, police
Office saves unit either building guardroom from damage.
In an alternative embodiment of the invention, when the second entrance guard device 140 judges that second area A2 has an at least people, example
Such as user 20, then the first entrance guard device 130 no longer receives the first identification information of next bit user.Until second area A2
User 20 be authorized into after the 3rd region A3, then the first entrance guard device 130, which is just allowed to receive next bit, uses
The first identification information of person is verified.Therefore, control current one by one is reached.
Fig. 2 is the flow chart according to the access control management method of one embodiment of the invention.As shown in Fig. 2, the embodiment of the present invention
Access control management method include step S210~S260.It is following referring to Fig. 1 and Fig. 2.The access control management method is applicable in
In above-mentioned first gate, 110 and second gate 120.As described above, the first gate 110 is arranged at first area A1 and second area
Between A2, the second gate 120 is arranged between second area A2 and the 3rd region A3.First gate, 110 initial preset is closing,
Second gate, 120 initial preset is closing.
In step S210, one first identification information that the first entrance guard device 130 judges to be inputted from first area A1 is
It is no to meet one first preset value.
In step S220, when the first identification information meets the first preset value, then the first entrance guard device 130 control first
Gate 110 is unlatching.
In step S230, when the first identification information does not meet the first preset value, then the first entrance guard device 130 control the
One gate 110 is closing.
In step S240, one second identification information that the second entrance guard device 140 judges to be inputted from second area A2 is
It is no to meet one second preset value.
In step s 250, when the second identification information meets the second preset value, then the second entrance guard device 140 control second
Gate 120 is unlatching.
In step S260, when the second identification information does not meet the second preset value, then the second entrance guard device 140 control the
Two gates 120 are closing.
Details in relation to above-mentioned steps has been specified in, and details are not described herein.
In conclusion the present invention carrys out the first identification to access card respectively through the first entrance guard device and the second entrance guard device
Information verified with the second identification information of corresponding user's biological characteristic, so as to opening for the first gate of control and the second gate
It opens or closed state.Thus, you can access card is avoided to be usurped by other people, promotes the security in entrance guard management.
In one embodiment, the first auxiliary information and the second auxiliary of sensing letter from second area are further sensed from first area
Breath, whether there is so as to auxiliary judgment has suspicious personage beyond user with entering, to solve the loophole in entrance guard management.
Although the present invention is disclosed above with foregoing embodiment, however, it is not to limit the invention.This hair is not being departed from
In bright spirit and scope, carried out by change and retouch, belong to the present invention scope of patent protection.It is defined on the present invention
Protection domain refer to appended claim.
Claims (10)
1. a kind of access control system, which is characterized in that including:
One first gate, is arranged between a first area and a second area;
One first entrance guard device couples first gate, to judge one first identification inputted from the first area
Whether information meets one first preset value, when first identification information meets first preset value, then controls described
One gate when first identification information does not meet first preset value, then controls first gate to be located to open
One closes;
One second gate is arranged between the second area and one the 3rd region;And
One second entrance guard device couples second gate and first entrance guard device, to judge from the second area
Whether one second identification information inputted meets one second preset value, is preset when second identification information meets described second
During value, then second gate is controlled when second identification information does not meet second preset value, then to be controlled to open
Second gate is located at one and closes;
Wherein, for the first gate initial preset to close, the second gate initial preset is closing.
2. access control system as described in claim 1, which is characterized in that first entrance guard device further determines whether
First identification information is received, when not receiving first identification information, then first gate is controlled to close, when connecing
When receiving first identification information, then the first area is monitored, to capture one first auxiliary information.
3. access control system as claimed in claim 2, which is characterized in that second entrance guard device further determines whether
Second identification information is received, when not receiving second identification information, then second gate is controlled to close, when connecing
When receiving second identification information, then the second area is monitored, to capture one second auxiliary information.
4. access control system as claimed in claim 3, which is characterized in that second entrance guard device determines whether described
Whether the second auxiliary information meets first auxiliary information, when second auxiliary information meets first auxiliary information
When, then second entrance guard device controls second gate to open, when second auxiliary information does not meet described first
During auxiliary information, then second entrance guard device controls second gate to close, and first entrance guard device control institute
The first gate is stated to close.
5. access control system as claimed in claim 4, which is characterized in that when second auxiliary information does not meet described
During one auxiliary information, then second entrance guard device further sends a circular message to a security monitoring unit.
6. access control system as described in claim 1, which is characterized in that first identification information is through an access card
Input first entrance guard device.
7. access control system as described in claim 1, which is characterized in that second identification information includes at least one biology
Feature.
8. a kind of access control management method, suitable for one first gate and one second gate, first gate locating is in one first
Between region and a second area, second gate locating is between the second area and one the 3rd region, the gate inhibition
Management method includes:
Whether one first identification information for judging to be inputted from the first area meets one first preset value;
When first identification information meets first preset value, then first gate is controlled to open;
When first identification information does not meet first preset value, then first gate is controlled to be located at one and is closed;
Whether one second identification information for judging to be inputted from the second area meets one second preset value;
When second identification information meets second preset value, then second gate is controlled to open;And
When second identification information does not meet second preset value, then second gate is controlled to be located at one and is closed;
Wherein, for the first gate initial preset to close, the second gate initial preset is closing.
9. access control management method as claimed in claim 8, which is characterized in that further include:
Judge whether to receive first identification information;
When not receiving first identification information, then first gate is controlled to close;
When receiving first identification information, then the first area is monitored, to capture one first auxiliary information;
Judge whether to receive second identification information;
When not receiving second identification information, then second gate is controlled to close;And
When receiving second identification information, then the second area is monitored, to capture one second auxiliary information.
10. access control management method as claimed in claim 9, which is characterized in that further include:
Judge whether second auxiliary information meets first auxiliary information;
When second auxiliary information meets first auxiliary information, then second gate is controlled to open;And
When second auxiliary information does not meet first auxiliary information, then second gate is controlled to close, and is controlled
First gate is made to close.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611026846.8A CN108091005A (en) | 2016-11-22 | 2016-11-22 | access control system and access control management method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611026846.8A CN108091005A (en) | 2016-11-22 | 2016-11-22 | access control system and access control management method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108091005A true CN108091005A (en) | 2018-05-29 |
Family
ID=62169377
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611026846.8A Pending CN108091005A (en) | 2016-11-22 | 2016-11-22 | access control system and access control management method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108091005A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113168742A (en) * | 2018-12-21 | 2021-07-23 | 因温特奥股份公司 | Access monitoring system of sliding door with gesture control function |
CN113168743A (en) * | 2018-12-21 | 2021-07-23 | 因温特奥股份公司 | Access monitoring system for sliding door having object monitoring function |
CN115273300A (en) * | 2022-07-21 | 2022-11-01 | 平安信托有限责任公司 | Gate control method, device, equipment and medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101245688A (en) * | 2007-02-15 | 2008-08-20 | 上海银晨智能识别科技有限公司 | Human face recognizing anti-tailing gate inhibition system |
CN101706976A (en) * | 2009-08-26 | 2010-05-12 | 深圳市飞瑞斯科技有限公司 | Anti-trailing system and device based on number of video viewers |
CN102063750A (en) * | 2010-11-23 | 2011-05-18 | 无锡港湾网络科技有限公司 | Anti-following AB door entrance/exit management system |
CN202472772U (en) * | 2012-02-13 | 2012-10-03 | 江苏达海智能系统股份有限公司 | Anti-follow secure channel device related to accurate weighing comparison |
CN204537263U (en) * | 2015-02-15 | 2015-08-05 | 福建省晋江市兆亨科技有限公司 | A kind of multistage gate control system |
CN204650628U (en) * | 2015-05-25 | 2015-09-16 | 深圳市中阳通讯有限公司 | A kind of recognition of face access control AB door system |
CN204731853U (en) * | 2015-05-12 | 2015-10-28 | 湖南德康慧眼控制技术股份有限公司 | A kind of AB every access control system |
-
2016
- 2016-11-22 CN CN201611026846.8A patent/CN108091005A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101245688A (en) * | 2007-02-15 | 2008-08-20 | 上海银晨智能识别科技有限公司 | Human face recognizing anti-tailing gate inhibition system |
CN101706976A (en) * | 2009-08-26 | 2010-05-12 | 深圳市飞瑞斯科技有限公司 | Anti-trailing system and device based on number of video viewers |
CN102063750A (en) * | 2010-11-23 | 2011-05-18 | 无锡港湾网络科技有限公司 | Anti-following AB door entrance/exit management system |
CN202472772U (en) * | 2012-02-13 | 2012-10-03 | 江苏达海智能系统股份有限公司 | Anti-follow secure channel device related to accurate weighing comparison |
CN204537263U (en) * | 2015-02-15 | 2015-08-05 | 福建省晋江市兆亨科技有限公司 | A kind of multistage gate control system |
CN204731853U (en) * | 2015-05-12 | 2015-10-28 | 湖南德康慧眼控制技术股份有限公司 | A kind of AB every access control system |
CN204650628U (en) * | 2015-05-25 | 2015-09-16 | 深圳市中阳通讯有限公司 | A kind of recognition of face access control AB door system |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113168742A (en) * | 2018-12-21 | 2021-07-23 | 因温特奥股份公司 | Access monitoring system of sliding door with gesture control function |
CN113168743A (en) * | 2018-12-21 | 2021-07-23 | 因温特奥股份公司 | Access monitoring system for sliding door having object monitoring function |
CN115273300A (en) * | 2022-07-21 | 2022-11-01 | 平安信托有限责任公司 | Gate control method, device, equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN206584426U (en) | A kind of Yunmen access control system | |
KR101022789B1 (en) | System and method for management a safe deposit box | |
CN106875523A (en) | A kind of Yunmen access control system and its management method | |
JP5040381B2 (en) | Entrance / exit management device | |
KR101960799B1 (en) | biometric recognition access control system having IoT and its control methods | |
KR101595413B1 (en) | Access control system and method with structure type approved by hierarchical manager based on ICT convergence technology | |
CN205080633U (en) | Security management system | |
CN106920296A (en) | It is anti-to trail intelligent door system and intelligent door control method | |
CN108091005A (en) | access control system and access control management method | |
CN105405186A (en) | Security and protection management method and security and protection management device | |
CN110930569B (en) | Security check control method and system | |
KR20170098778A (en) | Reservation system to visitor | |
CN201820277U (en) | Door access control system of door A and door B | |
CN108035621B (en) | A kind of intelligent door lock control method and device | |
US20130038448A1 (en) | Access Control System | |
KR100774029B1 (en) | Security area's exit and entrance control device | |
CN109064592A (en) | Room exoelectron end method of discrimination and intelligent door lock within doors | |
KR20180006169A (en) | Entrance Control System | |
KR101249940B1 (en) | Gate management system and method thereof | |
JP4258459B2 (en) | Moving object detection system | |
KR101557156B1 (en) | Management of gates using FRID system | |
KR20150114618A (en) | The Method to be controlled the Door Camera and Doorlock by SmartPhone with NFC Function Based on M2M in Mobile Network and the Equipment for it | |
CN114445948A (en) | Non-inductive passing system and method | |
KR20070110152A (en) | Processing device for locking and opening of image phase | |
CN114202843A (en) | Access control system, method, device, equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180529 |
|
WD01 | Invention patent application deemed withdrawn after publication |