CN108205834A - Access control management method and access control system - Google Patents

Access control management method and access control system Download PDF

Info

Publication number
CN108205834A
CN108205834A CN201711346645.0A CN201711346645A CN108205834A CN 108205834 A CN108205834 A CN 108205834A CN 201711346645 A CN201711346645 A CN 201711346645A CN 108205834 A CN108205834 A CN 108205834A
Authority
CN
China
Prior art keywords
user
access control
registered
facial image
gate inhibition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711346645.0A
Other languages
Chinese (zh)
Inventor
黄湘
张忠福
曹莉
刘杰
星存田
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Sensetime Technology Co Ltd
Original Assignee
Shenzhen Sensetime Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Sensetime Technology Co Ltd filed Critical Shenzhen Sensetime Technology Co Ltd
Priority to CN201711346645.0A priority Critical patent/CN108205834A/en
Publication of CN108205834A publication Critical patent/CN108205834A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Collating Specific Patterns (AREA)

Abstract

This application discloses a kind of access control management method and access control systems, the access control system realizes the registration of user by identity authentication terminal, gate inhibition's user data of the user to succeed in registration (face information and the matched user of collected facial image in the identity card held) is stored in the database by identity authentication terminal, the facial image of target user is acquired by access control terminal and matches collected facial image with the face information stored in the database, and the gate inhibition of the target user position is controlled to unlock in successful match.Based on application scheme, the safety of gate inhibition's identification can be effectively improved.

Description

Access control management method and access control system
Technical field
This application involves gate inhibition's technical fields, and in particular to a kind of access control management method and access control system.
Background technology
With the continuous development of economic society, requirement of the people to work and living environment is also continuously improved, in order to meet For people to gathering around there are one the work of safety and comfort, living environment, many building, garden entrance are assembled with gate.
Gate has the effects that managing the stream of people and specification pedestrian comes in and goes out, and gate is from being developed so far, the gate inhibition identification side that uses Formula includes:Brush password card and fingerprint recognition.The recognition speed of brush password card is fast, success rate is high, therefore passage rate is fast, but only Recognize password card, if pedestrian leaves behind, loses password card, just without right of access, in addition password card may also be stolen, these All there is great security risk to management.With respect to brush password card, fingerprint recognition can save the fiber crops for carrying the external medium of these machines It is tired.But the acquisition of fingerprint is easier to, and the possibility pretended is larger, so using loophole in the presence of certain.
As it can be seen that existing gate inhibition's identification method safety is relatively low.
Invention content
The application provides a kind of access control management method and access control system, for improving the safety of gate inhibition's identification.
The application first aspect provides a kind of access control management method, applied to access control system, the access control system Including:Identity authentication terminal, access control terminal and database.The access control management method includes:
The facial image of the access control terminal acquisition target user obtains facial image and the institute of the target user State the matching result of the face information stored in database;When the matching result is successful match, the target is controlled to use Gate inhibition's unlock of family position.
The identity authentication terminal in the following way stores face information into the database:Read use to be registered Face information in the identity card that family is held, and acquire the facial image of the user to be registered;When the face of reading When information is matched with the facial image of the user to be registered, the authentication success of the user to be registered, by the identity Certification successfully user to be registered gate inhibition's user data store to the database, to complete the note of the user to be registered Volume, wherein, gate inhibition's user data includes:The face information of the user to be registered.
Based on the application in a first aspect, in the first possible implementation, the access control system further includes:Clothes Business device;The database is located at the server;
The matching result of face information stored in the facial image for obtaining the target user and the database Including:Face matching request is sent to the server, the face matching request is included when time access control terminal is adopted The facial image of the target user collected;Receive the matching result that the server is fed back based on the face matching request.
The first possible realization method based on the application first aspect, in second of possible realization method, institute Server is stated to include:Management server and identification server;The database is located in the management server;
It is described to be specially to server transmission face matching request:The face is sent to the identification server With request;
It is described to receive the server and be specially based on the matching result that the face matching request is fed back:Receive the knowledge Matching result of the other server based on the face matching request and the Database Feedback.
The application second aspect provides a kind of access control system, including:
Identity authentication terminal, access control terminal and database;
Wherein, for storing gate inhibition's user data, gate inhibition's user data includes the database:The face letter of user Breath;
The identity authentication terminal is used for:The face information in the identity card that user to be registered is held is read, and is acquired The facial image of the user to be registered;When the face information of reading is matched with the facial image of the user to be registered When, the authentication success of the user to be registered, by gate inhibition's user data storage of the user to be registered to the data Library, to complete the registration of the user to be registered;
The access control terminal is used for:The facial image of target user is acquired, obtains the face figure of the target user As the matching result of face information with being stored in the database;When the matching result is successful match, described in control Gate inhibition's unlock of target user position.
Based on invention second aspect, in the first possible implementation, the access control system further includes:Service Device;The database is located at the server;
The access control terminal obtains the facial image of the target user and the data especially by following manner The matching result of the face information stored in library:Face matching request, the face matching request packet are sent to the server Containing when the facial image of time collected target user of access control terminal;It receives the server and is based on the face Matching result with request feedback.
The first possible realization method based on the application second aspect, in second of possible realization method, institute Server is stated to include:Management server and identification server;The database is located in the management server;
The identification server is used for:Receive the face matching request from the access control terminal;In response to described Face matching request, by the face information progress in the facial image included in the face matching request and the database Match;The matching result obtained to access control terminal feedback when time matching;
The management server is used for:The authentication sent from the identity authentication terminal is received successfully to treat Gate inhibition's user data of registered user manages and safeguards gate inhibition's user data.
Second of possible realization method based on the application second aspect, in the third possible realization method, institute State gate inhibition's user data further include it is at least one of following:Address name, cell-phone number and user identity card number;
The management server is additionally operable to:It is associated with the facial image of corresponding registered user and gate inhibition's user data.
Second of possible realization method based on the application second aspect, in the 4th kind of possible realization method, institute Access control system is stated to further include:Mobile management terminal;
The mobile management terminal is for the registration of user to be registered and for checking and managing the management server In gate inhibition's user data.
Based on the application second aspect, in the 5th kind of possible realization method, the identity authentication terminal is additionally operable to During the facial image for acquiring the user to be registered, In vivo detection is carried out to the user to be registered.
Based on the application second aspect, in the 6th kind of possible realization method, the identity authentication terminal includes optics Character recognition (Optical Character Recognition, OCR) module and chip read module, the authentication are whole End is additionally operable to:Before face information in the identity card for reading user to be registered and being held, to the user to be registered The identity card held carries out anti-fake certificate, passes through the people in the rear identity card for reading user to be registered and being held in access registrar Face information;
The anti-fake certificate includes:The first facial image on the identity card is obtained by the OCR module, passes through institute It states chip read module and obtains the second facial image stored in the chip of the identity card, if first facial image and institute State that the second facial image is consistent, then the anti-fake certificate of the identity card passes through;If first facial image and second people Face image is inconsistent, then the anti-fake certificate of the identity card does not pass through.
Based on the application second aspect, in the 6th kind of possible realization method, the database is located at gate inhibition control Terminal processed;
The access control terminal obtains the facial image of the target user and the data especially by following manner The matching result of the face information stored in library:In the access control terminal local, by collected facial image with it is described Face information in database is matched, to obtain the people stored in the facial image of the target user and the database The matching result of face information.
Based on the application second aspect either the first possible realization method of the application second aspect or this Shen Please second of possible realization method of second aspect or the third possible realization method of the application second aspect or 4th kind of possible realization method of person's the application second aspect or the 5th kind of possible realization side of the application second aspect 6th kind of possible realization method of formula or the application second aspect, in the 7th kind of possible realization method, the identity Certification terminal is additionally operable to:It receives gate inhibition's user data and checks request;Request is checked in response to gate inhibition's user data, shows institute State gate inhibition's user data in database.
Second of the first possible realization method or the application second aspect based on the application second aspect can Can realization method either the third possible realization method of the application second aspect or the application second aspect the Four kinds of possible realization methods either the 5th kind of possible realization method of the application second aspect or the application second party The 6th kind of possible realization method in face, in the 8th kind of possible realization method, the identity authentication terminal, gate inhibition control Wirelessly connected between terminal processed and the server, and the identity authentication terminal, the access control terminal and The server connects same LAN.
Therefore the access control system of the application realizes the registration of user by identity authentication terminal, is recognized by identity Terminal is demonstrate,proved by the user to succeed in registration (face information and the matched use of collected facial image in the identity card held Family) gate inhibition's user data storage in the database, by access control terminal acquire target user facial image and acquisition The matching result of face information stored in the facial image and database of the target user, and be successful match in matching result When the gate inhibition of the target user position is controlled to unlock.Due to face information Existence and uniquenss, and the gate inhibition in database uses User data includes the face information of user to succeed in registration, and the typing of gate inhibition's user data is needed in the identity card that user holds Face information matched with collected facial image, therefore, even if the identity card of user is usurped by criminal, criminal Also the identity card is difficult to be utilized and completes registration, so that criminal is difficult to trigger gate inhibition's unlock by deceptive information, quite In traditional scheme, application scheme can improve the safety of gate inhibition's identification to a certain extent.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or it will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of application, for those of ordinary skill in the art, without having to pay creative labor, may be used also To obtain other attached drawings according to these attached drawings.
Fig. 1 is access control management method one embodiment flow diagram that the application provides;
Fig. 2 is access control system one embodiment structure diagram that the application provides;
Fig. 3 is access control system another example structure schematic diagram that the application provides;
Fig. 4 is the access control system further embodiment structure diagram that the application provides.
Specific embodiment
To enable present invention purpose, feature, advantage more apparent and understandable, below in conjunction with the application The technical solution in the embodiment of the present application is clearly and completely described in attached drawing in embodiment, it is clear that described reality It is only some embodiments of the present application to apply example, and not all embodiments.Based on the embodiment in the application, the common skill in this field Art personnel all other embodiments obtained without making creative work belong to the model of the application protection It encloses.
Embodiment one
The embodiment of the present application provides a kind of access control management method, applied to access control system.The access control system packet It includes:Identity authentication terminal, access control terminal and database.As shown in Figure 1, the access control management method includes:
Step 101, the facial image of access control terminal acquisition target user;
In a step 102, access control terminal can include camera module, and acquiring target by the camera module uses The facial image at family.Specifically, above-mentioned camera module may be provided at entrance guard device, so that user wants to fill by the gate inhibition It, can be by head towards the camera lens of the camera module so that access control terminal collects the facial image of the user when putting.
Step 102, access control terminal obtain the face letter stored in the facial image and database of above-mentioned target user The matching result of breath;
In a step 102, (i.e. step 101 is got the facial image of the above-mentioned target user of access control terminal acquisition The facial image of the target user) with the matching result of face information that stores in above-mentioned database.
In a kind of application scenarios, above-mentioned database may be provided at above-mentioned access control terminal local, then above-mentioned gate inhibition's control Terminal processed can match the facial image of above-mentioned target user with the face information stored in above-mentioned database in local, To obtain above-mentioned matching result.Specifically, when there is the matched face of facial image with the target user in above-mentioned database During information, above-mentioned matching result is determined as successful match, when there is no the facial images with the target user in above-mentioned database During matched face information, determine above-mentioned matching result for it fails to match.
In another application scenarios, above-mentioned access control system may also include:Server.Above-mentioned server is located at above-mentioned Server.Step 102 can include:Above-mentioned access control terminal sends face matching request, above-mentioned face to above-mentioned server Matching request is included when the facial image of time above-mentioned collected target user of access control terminal;Above-mentioned server is received to be based on The matching result of above-mentioned face matching request feedback.Further, above-mentioned server can include management server and identification services Device;Above-mentioned database is particularly located in above-mentioned management server.It is above-mentioned to be specially to above-mentioned server transmission face matching request: The face matching request is sent to above-mentioned identification server;It is anti-that the above-mentioned above-mentioned server of reception is based on above-mentioned face matching request The matching result of feedback is specially:Receive of the above-mentioned identification server based on above-mentioned face matching request and above-mentioned Database Feedback With result.
In the embodiment of the present application, the face information stored in above-mentioned database can be obtained by above-mentioned identity authentication terminal, Above-mentioned identity authentication terminal stores face information into above-mentioned database especially by following manner:Read user institute to be registered Face information in the identity card held, and acquire the facial image of above-mentioned user to be registered;When the above-mentioned face information of reading When being matched with the facial image of above-mentioned user to be registered, the authentication success of above-mentioned user to be registered, by above-mentioned authentication Gate inhibition's user data storage of successful user to be registered is to the database, to complete the registration of above-mentioned user to be registered, In, above-mentioned gate inhibition's user data includes:The face information of above-mentioned user to be registered.
In the embodiment of the present application, identity card that above-mentioned user to be registered is held refer to the user to be registered currently into The identity card of row registration, the identity card due to user to be registered to be registered, which differs, is set to the body of the user to be registered Part card, therefore, identity authentication terminal can treat the identity of registered user and be authenticated in the embodiment of the present application, i.e.,:Authentication Terminal further acquires the facial image of user to be registered after face information is read, in the face information of reading and the people of acquisition When face image matches, it is believed that user to be registered is currently to the identity card registered as the identity of the user to be registered Card, determines the authentication success of above-mentioned user to be registered at this time, and gate inhibition's user data of above-mentioned user to be registered is stored To above-mentioned database, to complete the registration of above-mentioned user to be registered, otherwise, it is believed that user to be registered is currently being registered Identity card be the user to be registered identity card, at this time determine above-mentioned user to be registered authentication failure, no By gate inhibition's user data storage of above-mentioned user to be registered to above-mentioned database.Treat registered user's by identity authentication terminal Identity is authenticated, and the automation registration of user is on the one hand realized, on the other hand but also false body is difficult to be utilized in criminal Part is registered, so as to improve the safety of entrance guard management.
In the embodiment of the present application, above-mentioned identity authentication terminal can be arranged on information desk (such as commercial mansion foreground) or protect Work Safety Office (such as cell security personnel room), so that visitor or employee by the identity authentication terminal carry out authentication to complete to register. Specifically, identity authentication terminal is the equipment for having exclusive function (registering functional of user i.e. to be registered).In practical applications, Identity authentication terminal can be connect to (such as by serial ports connection or wireless connection) with card reader of ID card, so as to authentication Terminal reads user to be registered currently to the ID card information for the identity card registered, which includes the identity Face information (namely head image information) in card, further the ID card information can also be including one or more following letter Breath:Name, date of birth, ID card No., address.Correspondingly, the gate inhibition's user data of record in the database is in addition to user Face information except, one or more following information of the user can also be included:Address name, date of birth, use Family identification card number, address, cell-phone number (cell-phone number can be manually entered by user).
Alternatively, the face information stored in above-mentioned database can also be obtained by mobile management terminal, the mobile management is whole End can in the following way store face information into above-mentioned database:It reads in the identity card that user to be registered is held Face information, and acquire the facial image of above-mentioned user to be registered;Above-mentioned face information and above-mentioned user to be registered when reading Facial image matching when, the authentication success of above-mentioned user to be registered, by the successful user to be registered of above-mentioned authentication The storage of gate inhibition's user data to the database, to complete the registration of above-mentioned user to be registered, wherein, above-mentioned gate inhibition's number of users According to including:The face information of above-mentioned user to be registered.It should be noted that the mobile management terminal is different from above-mentioned authentication Terminal, the mobile management terminal can also include other functions, such as have other than having the registering functional of user to be registered Standby following function:Gate inhibition's user data of above-mentioned database is checked and managed, makes a phone call, surf the web, the amusement of sound shadow, playing Deng.Specifically, which can be the mobile terminals such as tablet computer, smart mobile phone, not limit herein.
Step 103, when above-mentioned matching result be successful match when, the gate inhibition of above-mentioned target user position is controlled to solve Lock;
In step 103, when the matching result that step 102 is got is successful match, above-mentioned access control terminal control The gate inhibition's unlock for making above-mentioned target user position.For example, when gate inhibition is gate mouth, the above-mentioned above-mentioned target user institute of control Gate inhibition in position, which unlocks, is:The gate mouth of above-mentioned target user position is controlled to automatically open;In another example when gate inhibition is magnetic When power is locked, gate inhibition's unlock of the above-mentioned above-mentioned target user position of control is:It controls in above-mentioned target user position Gate inhibition powers off, so that gate inhibition loses magnetic force, user can open the gate of the access control at this time.It is it should be noted that right In different types of gate inhibition, under the different condition after gate inhibition unlocks, gate inhibition also can locking again.For example, when gate inhibition is certainly During dynamic gate mouth, gate mouth automatically opens when which unlocks, and after preset duration is waited for or is detecting that user led to When crossing the gate mouth, the gate inhibition can automatic blocking, at this time the gate mouth be automatically closed;In another example when gate inhibition is magnetic key operated lock, After gate inhibition unlock, if (iron plate is typically mounted at gate to the electromagnetism (electromagnetism is typically mounted on doorframe) of the gate inhibition with iron plate On) do not detach whithin a period of time, then gate inhibition's automatic blocking (namely being re-powered to the magnetic key operated lock), if the electromagnetism of the gate inhibition It is contacted again after being detached with iron plate, then gate inhibition's automatic blocking (namely being re-powered to the magnetic key operated lock).
Optionally, it is wirelessly connected, and above-mentioned between above-mentioned identity authentication terminal and above-mentioned access control terminal Identity authentication terminal connects same LAN with above-mentioned access control terminal.Certainly, above-mentioned identity authentication terminal and above-mentioned gate inhibition Control terminal can also connect different LANs, alternatively, between above-mentioned identity authentication terminal and above-mentioned access control terminal It can be connected by wired mode, do not limited herein.
Therefore the access control management method of the application realizes the registration of user by identity authentication terminal, is recognized by identity Terminal is demonstrate,proved by the user to succeed in registration (face information and the matched use of collected facial image in the identity card held Family) gate inhibition's user data storage in the database, by access control terminal acquire target user facial image and acquisition The matching result of face information stored in the facial image and database of the target user, and be successful match in matching result When the gate inhibition of the target user position is controlled to unlock.Due to face information Existence and uniquenss, and the gate inhibition in database uses User data includes the face information of user to succeed in registration, and the typing of gate inhibition's user data is needed in the identity card that user holds Face information matched with collected facial image, therefore, even if the identity card of user is usurped by criminal, criminal Also the identity card is difficult to be utilized and completes registration, so that criminal is difficult to trigger gate inhibition's unlock by deceptive information, quite In traditional scheme, application scheme can improve the safety of gate inhibition's identification to a certain extent.
Embodiment two
Present application example provides a kind of access control system.As shown in Fig. 2, the access control system in the embodiment of the present application 20 include:
Identity authentication terminal 21, access control terminal 22 and database (not shown).
For storing gate inhibition's user data, above-mentioned gate inhibition's user data includes above-mentioned database:The face information of user.
Identity authentication terminal 21 is used for:The face information in the identity card that user to be registered is held is read, and is acquired State the facial image of user to be registered;When the above-mentioned face information of reading is matched with the facial image of above-mentioned user to be registered, Above-mentioned user to be registered authentication success, by above-mentioned authentication successfully user to be registered gate inhibition's user data store To above-mentioned database, to complete the registration of above-mentioned user to be registered.In the embodiment of the present application, identity authentication terminal 21 can be set In information desk (such as commercial mansion foreground) or room security (such as cell security personnel room), so that visitor or employee are recognized by the identity Card terminal 21 carries out authentication to complete to register.Specifically, identity authentication terminal 21 is has exclusive function (use i.e. to be registered The registering functional at family) equipment, in practical applications, identity authentication terminal 21 can be connect with card reader of ID card (such as Pass through serial ports connection or wireless connection), so that identity authentication terminal 21 reads body of the user to be registered currently to be registered The ID card information of part card, the ID card information include the face information (namely head image information) in the identity card, further should ID card information can also include one or more following information:Name, date of birth, ID card No., address.Accordingly , gate inhibition's user data in the database is recorded other than the face information of user, can also include the as follows of the user One or more information:(phone number can be by user hand for name, date of birth, ID card No., address, phone number Dynamic input).
Access control terminal 22 is used for:The facial image of target user is acquired, obtains the facial image of above-mentioned target user With the matching result of face information stored in above-mentioned database;When above-mentioned matching result is successful match, above-mentioned mesh is controlled The gate inhibition's unlock for marking user position.For example, when gate inhibition is gate mouth, the above-mentioned above-mentioned target user position of control Gate inhibition unlocks:The gate mouth of above-mentioned target user position is controlled to automatically open;In another example when gate inhibition is magnetic key operated lock, The gate inhibition of the above-mentioned above-mentioned target user position of control unlocks:The gate inhibition in above-mentioned target user position is controlled to break Electricity, so that the gate inhibition loses magnetic force, user can open the gate of the access control at this time.It should be noted that for not The gate inhibition of same type, under the different condition after gate inhibition unlocks, gate inhibition also can locking again.For example, when gate inhibition is automatic brake During machine mouth, gate mouth automatically opens, and after preset duration is waited for or detecting user by this when which unlocks During gate mouth, the gate inhibition can automatic blocking, at this time the gate mouth be automatically closed;In another example when gate inhibition is magnetic key operated lock, in the door After prohibiting unlock, if the electromagnetism (electromagnetism is typically mounted on doorframe) of the gate inhibition exists with iron plate (iron plate is typically mounted on gate) It is not detached in a period of time, then gate inhibition's automatic blocking (namely being re-powered to the magnetic key operated lock), if the electromagnetism and iron of the gate inhibition It is contacted again after piece separation, then gate inhibition's automatic blocking (namely being re-powered to the magnetic key operated lock).
In the embodiment of the present application, identity card that above-mentioned user to be registered is held refer to the user to be registered currently into The identity card of row registration, the identity card due to user to be registered to be registered, which differs, is set to the body of the user to be registered Part card, therefore, identity authentication terminal 21 can treat the identity of registered user and be authenticated in the embodiment of the present application, i.e.,:Identity is recognized Card terminal 21 further acquires the facial image of user to be registered, face information and acquisition in reading after face information is read Facial image matching when, it is believed that user to be registered is currently to the identity card registered as the user's to be registered Identity card determines the authentication success of above-mentioned user to be registered, and by gate inhibition's user data of above-mentioned user to be registered at this time Above-mentioned database is stored, to complete the registration of above-mentioned user to be registered, otherwise, it is believed that user to be registered is currently carrying out The identity card registered determines that the authentication of above-mentioned user to be registered is lost at this time not as the identity card of the user to be registered It loses, gate inhibition's user data of above-mentioned user to be registered is not stored to above-mentioned database.Note is treated by identity authentication terminal 21 The identity of volume user is authenticated, and the automation registration of user is on the one hand realized, on the other hand but also criminal is difficult to profit It is registered with false identities, so as to improve the safety of entrance guard management.
Optionally, identification authentication system 21 includes OCR module and chip read module, and identification authentication system 21 is additionally operable to: Before the face information in reading the identity card that user to be registered held, the identity card held to above-mentioned user to be registered Anti-fake certificate is carried out, passes through the face information in the rear identity card for reading user to be registered and being held in access registrar.Wherein, on Stating anti-fake certificate can include:The first facial image on above-mentioned identity card is obtained by the OCR module of identification authentication system, is led to The chip read module for crossing the identification authentication system obtains the second facial image stored in the chip of above-mentioned identity card, if above-mentioned First facial image is consistent with above-mentioned second facial image, it is determined that the anti-fake certificate of above-mentioned identity card passes through;If above-mentioned first Facial image and above-mentioned second facial image are inconsistent, it is determined that the anti-fake certificate of above-mentioned identity card does not pass through.
Optionally, identification authentication system 21 is additionally operable to during the facial image for acquiring above-mentioned user to be registered, right Above-mentioned user to be registered carries out In vivo detection.
In a kind of application scenarios, above-mentioned database is located at access control terminal 22.Access control terminal 22 especially by The matching result of face information stored in the facial image and the database of the following manner acquisition target user:In door It is local to prohibit control terminal 22, collected facial image is matched with the face information in above-mentioned database, to obtain State the matching result of face information stored in the facial image of target user and the database.
In another application scenarios, on the basis of access control system shown in Fig. 1, as shown in figure 3, entrance guard management System 30 can also include:Server 23.Above-mentioned database is located at server 23, that is, the database is arranged on server 23 In.In this application scenarios, access control terminal 22 especially by following manner obtain the facial image of above-mentioned target user with The matching result of the face information stored in the database:Face matching request, above-mentioned face matching are sent to server 23 Request is included when time 22 collected facial image of access control terminal;It is anti-based on above-mentioned face matching request to receive server 23 The matching result of feedback.
Further, on the basis of access control system shown in Fig. 3, as shown in figure 4, server 23 can include:Management Server 231 and identification server 232.Above-mentioned database is particularly located in management server 231, and identification server 232 is used for: Receive the face matching request from access control terminal 22;It, please by the matching of above-mentioned face in response to above-mentioned face matching request The facial image included is asked to be matched with the face information in above-mentioned database;To the feedback of access control terminal 22 when secondary With obtained matching result.In the embodiment of the present application, when the facial image included in above-mentioned face matching request and above-mentioned data During face information successful match in library (namely there is the facial image included with the face matching request in above-mentioned database During matched face information), it may be determined that matching result is successful match, feeds back the matching knot to access control terminal 22 at this time Fruit, so that access control terminal 22 is known when secondary matching result is successful match;When what is included in above-mentioned face matching request When facial image matches unsuccessful with the face information in above-mentioned database (namely be not present and the face in above-mentioned database During face information matched with the included facial image of request), it may be determined that matching result is that it fails to match, is controlled at this time to gate inhibition Terminal 22 processed feeds back the matching result, so that access control terminal 22 is known when secondary matching result is it fails to match.
Management server 231 is used for:Receive the authentication sent from identity authentication terminal 21 successfully use to be registered Gate inhibition's user data at family manages and safeguards above-mentioned gate inhibition's user data.
Optionally, above-mentioned gate inhibition's user data further includes at least one of following:Address name, cell-phone number and user identity card Number.Wherein, address name, user identity card number can be obtained by reading identity card, and cell-phone number can be inputted by user Mode obtain.Further, management server 231 is additionally operable to:It is associated with the facial image of corresponding registered user and gate inhibition's number of users According to that is, by the facial image of same registered user (user to succeed in registration) and gate inhibition's user data associated storage.
Optionally, on the basis of the access control system shown in Fig. 2, Fig. 3 or 4, access control system may also include movement Management terminal.The mobile management terminal is for the registration of user to be registered and for checking and managing above-mentioned management server In gate inhibition's user data.It should be noted that the mobile management terminal is different from identity authentication terminal 21, the mobile management is whole End can also include other functions, such as have following function other than having the registering functional of user to be registered:Check and Manage gate inhibition's user data of above-mentioned database, make a phone call, surf the web, sound shadow amusement, game etc..Specifically, the movement Management terminal can be the mobile terminals such as tablet computer, smart mobile phone, not limit herein.
Optionally, in any access control system described in the embodiment of the present application, user can also look in database Gate inhibition's user data.Optionally, identity authentication terminal 22 is additionally operable to:It receives gate inhibition's user data and checks request;In response to upper It states gate inhibition's user data and checks request, show gate inhibition's user data in above-mentioned database.If specifically, above-mentioned data lab setting In access control terminal 22, then identity authentication terminal 22 can be from 22 calling and obtaining user of the access control terminal gate inhibition user to be checked Data, and the gate inhibition's user data transferred by display screen displaying.Alternatively, if above-mentioned database is arranged in server 23, ring Should check request in above-mentioned gate inhibition's user data, identity authentication terminal 22 can from server 23 door to be checked of calling and obtaining user Disable user data, and the gate inhibition's user data transferred by display screen displaying.
Optionally, in Fig. 2 or shown in Fig. 3 access control systems, identity authentication terminal 21,22 and of access control terminal It is wirelessly connected between server 23, and identity authentication terminal 21, access control terminal 22 and server 23 connect together One LAN.Certainly, identity authentication terminal 21, access control terminal 22 and server 23 can not also connect same local entirely Net, alternatively, can also be logical by wired mode or part between identity authentication terminal 21, access control terminal 22 and server 23 Cross wired mode connection (such as identity authentication terminal 21 is connect with server 23 by wired mode, identity authentication terminal 21 and Access control terminal 22 wirelessly connects, and access control terminal 22 is wirelessly connect with server 23), herein It does not limit.
Therefore the access control system of the application realizes the registration of user by identity authentication terminal, is recognized by identity Terminal is demonstrate,proved by the user to succeed in registration (face information and the matched use of collected facial image in the identity card held Family) gate inhibition's user data storage in the database, by access control terminal acquire target user facial image and acquisition The matching result of face information stored in the facial image and database of the target user, and be successful match in matching result When the gate inhibition of the target user position is controlled to unlock.Due to face information Existence and uniquenss, and the gate inhibition in database uses User data includes the face information of user to succeed in registration, and the typing of gate inhibition's user data is needed in the identity card that user holds Face information matched with collected facial image, therefore, even if the identity card of user is usurped by criminal, criminal Also the identity card is difficult to be utilized and completes registration, so that criminal is difficult to trigger gate inhibition's unlock by deceptive information, quite In traditional scheme, application scheme can improve the safety of gate inhibition's identification to a certain extent.
It should be appreciated that the present processes and device, system may be achieved in many ways.It for example, can be by soft Part, hardware, firmware or software, hardware, firmware any combinations realize the present processes and device, equipment.For side Merely to illustrate, the step of the present processes, is not limited to described in detail above suitable for the said sequence of the step of method Sequence, unless specifically stated otherwise.In addition, in some embodiments, the application can be also embodied as being recorded in record Jie Program in matter, these programs include being used to implement the machine readable instructions according to the present processes.Thus, the application is also covered Lid storage is for execution according to the recording medium of the program of the present processes.
It should be noted that it in the above-described embodiments, all emphasizes particularly on different fields to the description of each embodiment, in some embodiment The part not being described in detail may refer to the associated description of other embodiments.
The description of the present application provides for the sake of example and description, and is not exhaustively or by the application It is limited to disclosed form.Many modifications and variations are obvious for the ordinary skill in the art.It selects and retouches Embodiment is stated and be the principle and practical application in order to more preferably illustrate the application, and those of ordinary skill in the art is enable to manage The application is solved so as to design the various embodiments with various modifications suitable for special-purpose.

Claims (10)

1. a kind of access control management method, applied to access control system, which is characterized in that the access control system includes:Body Part certification terminal, access control terminal and database, the access control management method include:
The facial image of the access control terminal acquisition target user, obtains the facial image of the target user and the number According to the matching result of the face information stored in library;When the matching result is successful match, the target user institute is controlled Gate inhibition in position unlocks.
The identity authentication terminal in the following way stores face information into the database:Read user institute to be registered Face information in the identity card held, and acquire the facial image of the user to be registered;When the face information of reading When being matched with the facial image of the user to be registered, the authentication success of the user to be registered, by the authentication Gate inhibition's user data storage of successful user to be registered is to the database, to complete the registration of the user to be registered, In, gate inhibition's user data includes:The face information of the user to be registered.
2. access control management method according to claim 1, which is characterized in that the access control system further includes:Service Device;The database is located at the server;
The facial image for obtaining the target user includes with the matching result of face information stored in the database: Face matching request is sent to the server, the face matching request is included when time access control terminal is collected The facial image of target user;Receive the matching result that the server is fed back based on the face matching request.
3. access control management method according to claim 2, which is characterized in that the server includes:Management server and Identify server;The database is located in the management server;
It is described to be specially to server transmission face matching request:Sending the face matching to the identification server please It asks;
It is described to receive the server and be specially based on the matching result that the face matching request is fed back:Receive the identification clothes Business matching result of the device based on the face matching request and the Database Feedback.
4. a kind of access control system, which is characterized in that including:
Identity authentication terminal, access control terminal and database;
Wherein, for storing gate inhibition's user data, gate inhibition's user data includes the database:The face information of user;
The identity authentication terminal is used for:The face information in the identity card that user to be registered is held is read, and described in acquisition The facial image of user to be registered;When the face information of reading is matched with the facial image of the user to be registered, institute The authentication success of user to be registered is stated, gate inhibition's user data storage of the successful user to be registered of the authentication is arrived The database, to complete the registration of the user to be registered;
The access control terminal is used for:Acquire the facial image of target user, obtain the facial image of the target user with The matching result of the face information stored in the database;When the matching result is successful match, the target is controlled Gate inhibition's unlock of user position.
5. access control system according to claim 4, which is characterized in that the access control system further includes:Service Device;The database is located at the server;
The access control terminal is obtained especially by following manner in facial image and the database of the target user The matching result of the face information of storage:Face matching request is sent to the server, the face matching request, which includes, to be worked as The facial image of the secondary collected target user of access control terminal;Receiving the server please based on face matching It negates the matching result of feedback.
6. access control system according to claim 5, which is characterized in that the server includes:Management server and Identify server;The database is located in the management server;
The identification server is used for:Receive the face matching request from the access control terminal;In response to the face Matching request matches the facial image included in the face matching request with the face information in the database; The matching result obtained to access control terminal feedback when time matching;
The management server is used for:Reception is successfully to be registered from the authentication that the identity authentication terminal is sent Gate inhibition's user data of user manages and safeguards gate inhibition's user data.
7. access control system according to claim 6, which is characterized in that
Gate inhibition's user data further includes at least one of following:Address name, cell-phone number and user identity card number;
The management server is additionally operable to:It is associated with the facial image of corresponding registered user and gate inhibition's user data.
8. access control system according to claim 6, which is characterized in that the access control system further includes:It is mobile Management terminal;
The mobile management terminal is for the registration of user to be registered and for checking and managing in the management server Gate inhibition's user data.
9. access control system according to claim 4, which is characterized in that
The identity authentication terminal is additionally operable to during the facial image for acquiring the user to be registered, to described to be registered User carries out In vivo detection.
10. access control system according to claim 4, which is characterized in that the identity authentication terminal includes optics word Symbol identification OCR module and chip read module, the identity authentication terminal are additionally operable to:Held in the reading user to be registered Identity card in face information before, the identity card held to the user to be registered carries out anti-fake certificate, recognizes in access Card reads the face information in the identity card that user to be registered is held after passing through;
The anti-fake certificate includes:The first facial image on the identity card is obtained by the OCR module, passes through the core Piece read module obtains the second facial image stored in the chip of the identity card, if first facial image and described the Two facial images are consistent, then the anti-fake certificate of the identity card passes through;If first facial image and the second face figure As inconsistent, then the anti-fake certificate of the identity card does not pass through.
CN201711346645.0A 2017-12-15 2017-12-15 Access control management method and access control system Pending CN108205834A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711346645.0A CN108205834A (en) 2017-12-15 2017-12-15 Access control management method and access control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711346645.0A CN108205834A (en) 2017-12-15 2017-12-15 Access control management method and access control system

Publications (1)

Publication Number Publication Date
CN108205834A true CN108205834A (en) 2018-06-26

Family

ID=62604735

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711346645.0A Pending CN108205834A (en) 2017-12-15 2017-12-15 Access control management method and access control system

Country Status (1)

Country Link
CN (1) CN108205834A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108900536A (en) * 2018-08-03 2018-11-27 Oppo广东移动通信有限公司 Authentication method, device, computer equipment and storage medium
CN109215196A (en) * 2018-09-10 2019-01-15 上海若禅信息科技有限公司 Rental house management method and system based on intelligent door lock
CN109271766A (en) * 2018-10-15 2019-01-25 意盛(北京)科技有限责任公司 A kind of auth method and system based on program interaction
CN109300216A (en) * 2018-11-27 2019-02-01 浙江中正智能科技有限公司 Intelligent networking locking device based on resident identification card real-name authentication
CN110096974A (en) * 2019-04-17 2019-08-06 宁波目果信息科技有限公司 A kind of sight spot tourist based on recognition of face enters the method and system of garden veritification
CN110335379A (en) * 2019-05-30 2019-10-15 深圳市威富视界有限公司 Intelligent door lock control method based on recognition of face
CN110427887A (en) * 2019-08-02 2019-11-08 腾讯科技(深圳)有限公司 A kind of membership's recognition methods and device based on intelligence
CN110555931A (en) * 2019-08-31 2019-12-10 华南理工大学 Face detection and gate inhibition system device based on deep learning recognition
CN110765830A (en) * 2019-06-12 2020-02-07 天津新泰基业电子股份有限公司 Full self-service registration method, system, medium and equipment for human face
CN110853208A (en) * 2018-07-24 2020-02-28 佛山弘视智能信息科技有限公司 Reverse verification face access control method, forward recognition face access control method and device
CN111209769A (en) * 2018-11-06 2020-05-29 深圳市商汤科技有限公司 Identity authentication system and method, electronic device, and storage medium
CN112598837A (en) * 2020-11-24 2021-04-02 福州芸鼎互链信息科技有限公司 Method for realizing self-service face input through information interaction access control
CN112667984A (en) * 2020-12-31 2021-04-16 上海商汤临港智能科技有限公司 Identity authentication method and device, electronic equipment and storage medium
CN114882630A (en) * 2022-04-27 2022-08-09 广东职业技术学院 Internet of things access control system and control method thereof
CN116168483A (en) * 2023-02-20 2023-05-26 光控特斯联(上海)信息科技有限公司 Entrance guard unlocking method and device

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102045162A (en) * 2009-10-16 2011-05-04 电子科技大学 Personal identification system of permittee with tri-modal biometric characteristic and control method thereof
CN102129555A (en) * 2011-03-23 2011-07-20 北京深思洛克软件技术股份有限公司 Second-generation identity card-based authentication method and system
CN103279764A (en) * 2013-06-27 2013-09-04 苏州福丰科技有限公司 Real-name network authentication system based on face identification
CN104123485A (en) * 2014-07-18 2014-10-29 广州三星通信技术研究有限公司 Real-name system information binding method and device
CN104243163A (en) * 2014-08-26 2014-12-24 深圳泰山在线科技有限公司 Self-service user registration and login method and system
CN104820814A (en) * 2015-05-07 2015-08-05 熊小军 Second-generation ID card anti-counterfeiting verification system
CN104899493A (en) * 2015-05-29 2015-09-09 福建省智慧物联网研究院有限责任公司 Novel face authentication system for examination
CN205880963U (en) * 2016-07-20 2017-01-11 江苏华通晟云科技有限公司 Current management all -in -one of personnel based on people's face, fingerprint and ID card are verified
CN106657086A (en) * 2016-12-28 2017-05-10 汉王科技股份有限公司 Identity authentication method and apparatus based on cloud platform
CN206619179U (en) * 2017-01-16 2017-11-07 重庆特斯联智慧科技股份有限公司 Intelligent hotel moves in gate inhibition
CN107403490A (en) * 2017-07-18 2017-11-28 湖南中南楷思科技发展有限公司 A kind of Intelligent entrance guard management system

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102045162A (en) * 2009-10-16 2011-05-04 电子科技大学 Personal identification system of permittee with tri-modal biometric characteristic and control method thereof
CN102129555A (en) * 2011-03-23 2011-07-20 北京深思洛克软件技术股份有限公司 Second-generation identity card-based authentication method and system
CN103279764A (en) * 2013-06-27 2013-09-04 苏州福丰科技有限公司 Real-name network authentication system based on face identification
CN104123485A (en) * 2014-07-18 2014-10-29 广州三星通信技术研究有限公司 Real-name system information binding method and device
CN104243163A (en) * 2014-08-26 2014-12-24 深圳泰山在线科技有限公司 Self-service user registration and login method and system
CN104820814A (en) * 2015-05-07 2015-08-05 熊小军 Second-generation ID card anti-counterfeiting verification system
CN104899493A (en) * 2015-05-29 2015-09-09 福建省智慧物联网研究院有限责任公司 Novel face authentication system for examination
CN205880963U (en) * 2016-07-20 2017-01-11 江苏华通晟云科技有限公司 Current management all -in -one of personnel based on people's face, fingerprint and ID card are verified
CN106657086A (en) * 2016-12-28 2017-05-10 汉王科技股份有限公司 Identity authentication method and apparatus based on cloud platform
CN206619179U (en) * 2017-01-16 2017-11-07 重庆特斯联智慧科技股份有限公司 Intelligent hotel moves in gate inhibition
CN107403490A (en) * 2017-07-18 2017-11-28 湖南中南楷思科技发展有限公司 A kind of Intelligent entrance guard management system

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110853208A (en) * 2018-07-24 2020-02-28 佛山弘视智能信息科技有限公司 Reverse verification face access control method, forward recognition face access control method and device
CN108900536A (en) * 2018-08-03 2018-11-27 Oppo广东移动通信有限公司 Authentication method, device, computer equipment and storage medium
CN109215196A (en) * 2018-09-10 2019-01-15 上海若禅信息科技有限公司 Rental house management method and system based on intelligent door lock
CN109271766A (en) * 2018-10-15 2019-01-25 意盛(北京)科技有限责任公司 A kind of auth method and system based on program interaction
CN111209769B (en) * 2018-11-06 2024-03-08 深圳市商汤科技有限公司 Authentication system and method, electronic device and storage medium
CN111209769A (en) * 2018-11-06 2020-05-29 深圳市商汤科技有限公司 Identity authentication system and method, electronic device, and storage medium
CN109300216A (en) * 2018-11-27 2019-02-01 浙江中正智能科技有限公司 Intelligent networking locking device based on resident identification card real-name authentication
CN110096974A (en) * 2019-04-17 2019-08-06 宁波目果信息科技有限公司 A kind of sight spot tourist based on recognition of face enters the method and system of garden veritification
CN110335379A (en) * 2019-05-30 2019-10-15 深圳市威富视界有限公司 Intelligent door lock control method based on recognition of face
CN110765830A (en) * 2019-06-12 2020-02-07 天津新泰基业电子股份有限公司 Full self-service registration method, system, medium and equipment for human face
CN110765830B (en) * 2019-06-12 2022-11-04 天津新泰基业电子股份有限公司 Full self-service registration method, system, medium and equipment for human face
CN110427887B (en) * 2019-08-02 2023-03-10 腾讯科技(深圳)有限公司 Member identity identification method and device based on intelligence
CN110427887A (en) * 2019-08-02 2019-11-08 腾讯科技(深圳)有限公司 A kind of membership's recognition methods and device based on intelligence
CN110555931A (en) * 2019-08-31 2019-12-10 华南理工大学 Face detection and gate inhibition system device based on deep learning recognition
CN112598837A (en) * 2020-11-24 2021-04-02 福州芸鼎互链信息科技有限公司 Method for realizing self-service face input through information interaction access control
CN112667984A (en) * 2020-12-31 2021-04-16 上海商汤临港智能科技有限公司 Identity authentication method and device, electronic equipment and storage medium
CN114882630A (en) * 2022-04-27 2022-08-09 广东职业技术学院 Internet of things access control system and control method thereof
CN116168483A (en) * 2023-02-20 2023-05-26 光控特斯联(上海)信息科技有限公司 Entrance guard unlocking method and device

Similar Documents

Publication Publication Date Title
CN108205834A (en) Access control management method and access control system
CN105678872B (en) A kind of access control system and its authorization method and access control terminal equipment
CN104935438B (en) Method and apparatus for authentication
CN106101136A (en) The authentication method of a kind of biological characteristic contrast and system
CN104169933A (en) Method, apparatus, and computer-readable recording medium for authenticating a user
CN207473677U (en) A kind of scenic spot ticket check gate system based on living things feature recognition
DE112012000185T5 (en) Apparatus and method for identity authentication
US11496471B2 (en) Mobile enrollment using a known biometric
CN106992956A (en) A kind of methods, devices and systems for realizing inter-device authentication
CN1951326A (en) Identity recognition system and method based on intelligent physical characteristics collecting and processing terminal
CN108205835A (en) Access control method and access control system
CN107025397A (en) The acquisition methods and device of identity information
CN107038509A (en) Self-service registration-management system
CN107426499A (en) Unattended gate inhibition's guest system and access control method
CN108090981A (en) Meeting signature system and method based on face recognition technology
CN106355709A (en) Access control system and door opening method based on dynamic quick response code
CN108241999A (en) A kind of generation method of invoice information, apparatus and system
CN206557867U (en) Gate control system based on dynamic two-dimension code
CN105830079B (en) Authentication information managing system, authentication information managing equipment, program, recording medium and authentication information managing method
CN210199842U (en) Intelligent hotel check-in and door lock control system
CN106408712A (en) Intelligent door access control system
Shrestha et al. Theft-resilient mobile wallets: Transparently authenticating NFC users with tapping gesture biometrics
CN110322889A (en) A kind of personal identification method of high reliablity
CN110443740A (en) A kind of identity identifying method and system
CN110189446A (en) A kind of access control system based on sound groove recognition technology in e

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180626

RJ01 Rejection of invention patent application after publication