CN109147124A - security system and method - Google Patents
security system and method Download PDFInfo
- Publication number
- CN109147124A CN109147124A CN201810900056.0A CN201810900056A CN109147124A CN 109147124 A CN109147124 A CN 109147124A CN 201810900056 A CN201810900056 A CN 201810900056A CN 109147124 A CN109147124 A CN 109147124A
- Authority
- CN
- China
- Prior art keywords
- facial image
- access control
- card information
- control host
- machine
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/38—Individual registration on entry or exit not involving the use of a pass with central registration
Abstract
This application involves a kind of security systems, it include: all-in-one machine, including face recognition module, ID card information acquisition module and comparison module, face recognition module is for acquiring facial image, ID card information acquisition module demonstrate,proves information for captured identity, and comparison module is used for when the facial image of acquisition is consistent with pre-stored image, or, when the facial image of acquisition is consistent with the facial image in the ID card information of acquisition, opening signal is sent to access control host;Access control host communicates to connect with all-in-one machine, is sent to electromagnetic lock for receiving opening signal, and by opening signal;Electromagnetic lock is connect with access control main-machine communication, for executing opening door operation after receiving opening signal;Server is connect with access control main-machine communication, for receiving the facial image and ID card information of the transmission of access control host, and is compared with the information of the fugitive personnel in public security private network, and is alarmed when comparing consistent, and fugitive personnel positions are tracked.
Description
Technical field
This application involves intelligent safety protection technical field more particularly to a kind of security systems and method.
Background technique
Social security refers to the stable order of society, but always has lawless people not abide by social security requirement, therefore, it is related
Technical staff develops security system.
In the related technology, security system can only generally register the identity information of corresponding personnel by identity card, but cannot protect
The identity information of card registration is exactly the identity information for holding identity witness, provides to fugitive personnel and escapes opportunity, it cannot be guaranteed that group
Many safety.
Summary of the invention
To be overcome the problems, such as present in the relevant technologies at least to a certain extent, the application provides a kind of security system and side
Method.
According to the embodiment of the present application in a first aspect, provide a kind of security system, including all-in-one machine, including recognition of face mould
Block, ID card information acquisition module and comparison module, the face recognition module is for acquiring facial image, the identity card letter
It ceases acquisition module and demonstrate,proves information for captured identity, the comparison module is used for the facial image and pre-stored image one in acquisition
When cause, or, being controlled when the facial image of acquisition is consistent with the facial image in the ID card information of acquisition to gate inhibition
Host processed sends opening signal;
Access control host is communicated to connect with the all-in-one machine, is believed for receiving the opening signal, and by the enabling
Number it is sent to electromagnetic lock;
Electromagnetic lock is connect with the access control main-machine communication, for executing the behaviour that opens the door after receiving the opening signal
Make;
Server is connect with the access control main-machine communication, for receiving described in the access control host transmission
Facial image and the ID card information, and be compared with the information of the fugitive personnel in public security private network, and consistent comparing
Shi Jinhang alarm, and, when comparing consistent, record sends the gate inhibition control of the facial image and the ID card information
The position of host processed, and generate according to the position recorded the running track of the fugitive personnel.
Optionally, the all-in-one machine, the access control host and the electromagnetic lock are located in the same local area network.
Optionally, pass through wired or wireless connection between the all-in-one machine and the access control host;And/or it is described
Pass through wired or wireless connection between access control host and the electromagnetic lock.
Optionally, it is connected between the access control host and the server by cellular mobile network.
Optionally, the cellular mobile network is 4G network.
Optionally, the all-in-one machine is located at the outside of door to be opened.
Optionally, the access control host is located at outside, the inside or the inside of door to be opened.
Optionally, the electromagnetic lock is located at the inside of door to be opened.
Optionally, the server is cloud server.
According to the second aspect of the embodiment of the present application, a kind of safety protection method is provided, comprising: acquisition facial image and identity card
Information;
Compare the facial image in the facial image and ID card information;
When the two is consistent, opening door operation is executed;
In the comparison twice, when once the comparison is consistent at least within, opening door operation is executed;
The facial image and ID card information are compared with the information of the fugitive personnel in public security private network, and than
To it is consistent when alarm, and, when comparing consistent, record sends the described of the facial image and the ID card information
The position of access control host, and generate according to the position recorded the running track of the fugitive personnel.
Technical solution provided by the present application can include the following benefits:
It is served as theme with facial image, facial image is compared by recognition of face video camera or identity card reader, confirms quilt
The identity information for comparing people, after comparing successfully, access control host controls door and opens, while facial image is sent to server
Face database be compared, if the facial image of fugitive personnel, then automatic alarm, if not the facial image of fugitive personnel, then
It does not alarm.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not
The application can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the application
Example, and together with specification it is used to explain the principle of the application.
Fig. 1 is the structural schematic diagram for the security system that the application one embodiment provides;
Fig. 2 is the flow chart for the security system that the application another real-time example provides.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the application.On the contrary, they be only with it is such as appended
The example of the consistent device and method of some aspects be described in detail in claims, the application.
Fig. 1 is the structural schematic diagram for the security system that the application one embodiment provides.As shown in Figure 1, the security system
Include:
All-in-one machine 11, including face recognition module 111, ID card information acquisition module 112 and comparison module 113, it is described
Face recognition module 111 demonstrate,proves information for captured identity for acquiring facial image, the ID card information acquisition module 112,
The comparison module 113 is used for when the facial image of acquisition is consistent with pre-stored image, or, in the face figure of acquisition
When picture is consistent with the facial image in the ID card information of acquisition, opening signal is sent to access control host;
Access control host 12 is communicated to connect with the all-in-one machine 11, is opened for receiving the opening signal, and by described
Gate signal is sent to electromagnetic lock;
Electromagnetic lock 13 is communicated to connect with the access control host 12, is opened for receiving to execute after the opening signal
Door operation;
Server 14 is communicated to connect with the access control host 12, is sent for receiving the access control host 12
The facial image and the ID card information, and be compared with the information of the fugitive personnel in public security private network, and than
To it is consistent when alarm, and, when comparing consistent, record sends the described of the facial image and the ID card information
The position of access control host, and generate according to the position recorded the running track of the fugitive personnel.
It should be noted that above-mentioned all-in-one machine integrates recognition of face, ID card information read functions, above-mentioned one
Machine, access control host, electromagnetic lock can be installed on neighbouring cell unit door, office building doorway or school Office Area etc..On
Stating face recognition module further includes camera, for shooting the facial image of visiting personnel, above-mentioned ID card information acquisition module
Using current technology, similar at the train station or when safety check is crossed on airport, brush identity card reads people's identity information and simultaneously images comparison
Technology.The face information library of the fugitive personnel of above-mentioned server and public security private network communicates to connect, can be on backstage when server is alarmed
Face information library software page pop-up alarm dialog box.
Above-mentioned pre-stored image can be the facial image of resident in unit building, and the facial image of above-mentioned acquisition can be resident
Facial image, or the facial image of any nonnative personnel, when resident is into building, all-in-one machine acquires resident's facial image,
And be compared with pre-stored image, when comparing consistent, opening signal is sent, when nonnative personnel is into building, all-in-one machine needs to acquire it
Facial image and ID card information, and the facial image of acquisition is compared with the facial image in ID card information, than
To it is consistent when, send open the door it is information-based.
In the present embodiment, which passes through face figure by acquisition facial image and ID card information two ways
As comparing with pre-stored image, the facial image in facial image and ID card information compares, the primary comparison in comparison twice
When consistent, opening signal is sent to access control host, access control host sends opening signal after receiving opening signal
To electromagnetic lock, electromagnetic lock opens the door, and server receives the facial image and ID card information that access control host is sent, and with it is fugitive
Face information in the face information library of personnel is compared, and compares consistent alarm and is tracked to fugitive personnel positions and determines
Position, with the fugitive personnel motion trail of fast track and can position fugitive personnel position, implement to arrest to it in time, improve
Public security officer arrests efficiency, while effective guarantee masses'safety.
In some embodiments, the all-in-one machine, the access control host and the electromagnetic lock are located at the same local area network
In.
In the present embodiment, all-in-one machine, gate inhibition's host, electromagnetic lock and server can be all located at same local area network, convenient for being somebody's turn to do
Security system carries out information exchange.
In some embodiments, pass through wired or wireless connection between the all-in-one machine and the access control host;With/
Or, passing through wired or wireless connection between the access control host and the electromagnetic lock.
It should be noted that above-mentioned wireless connection can be 4G (the 4th Generation mobile
Communication technology, fourth generation mobile communication technology) communication connection, or WiFi (WIreless-
FIdelity, Wireless Fidelity) connection.
In the present embodiment, it can pass through between all-in-one machine and access control host, between access control host and electromagnetic lock
A variety of connection type connections, increase the diversity of system mount scheme, enhance exploitativeness.
In some embodiments, connected between the access control host and the server by cellular mobile network.
Specifically, the cellular mobile network is 4G network.
It should be noted that above-mentioned cellular mobile network is using cellular radio networking mode, in terminal and the network equipment
Between connected by radio channel, and then realize that equipment room is in communication with each other.
It, can also in the case where terminal is mobile device by using cellular mobile network connection type in the present embodiment
To realize telecommunication.
In some embodiments, the all-in-one machine is located at the outside of door to be opened.
It should be noted that above-mentioned door to be opened can be door, office building gate, school gate or the school of unit building
The door in classroom.
In the present embodiment, all-in-one machine is located to the outside of door to be opened, nonnative personnel needs collected in the outside of door
Facial image can just enter in door after comparing unanimously, can be with effective guarantee personnel safety.
In some embodiments, the access control host is located at outside, the inside or the inside of door to be opened.
It is integrated, can also be provided separately in door it should be noted that access control host can be arranged with all-in-one machine
Face also can be set inside door.
In the present embodiment, the diversity and exploitativeness for increasing scheme in multiple positions is can be set in access control host.
In some embodiments, the electromagnetic lock is located at the inside of door to be opened.
It should be noted that above-mentioned electromagnetic lock is set to the inside of door body to be opened.
In the present embodiment, electromagnetic lock is set to the inside with open door, reduces the rate of decay of electromagnetic lock and by people
A possibility that destroy.
In some embodiments, the server is cloud server.
It should be noted that above-mentioned server is connect with public security private network communication, it can be from the face information library of public security private network
It is middle to obtain fugitive personal information, it is compared with the facial image of all-in-one machine acquisition.
In the present embodiment, by the way that cloud server is arranged, the face of the facial image of acquisition and public security private network can be believed
The facial image of fugitive personnel is compared in breath library, thereby determines that whether the people of collected facial image is fugitive personnel, if
It is then to alarm, and count fugitive personnel motion trail, determines fugitive personnel positions.
Fig. 2 be the application the other is the safety protection method that embodiment provides flow chart.This method comprises the following steps:
S21: acquisition facial image and ID card information;
It should be noted that above-mentioned acquisition facial image can be acquired by camera;
S22: comparing the facial image and pre-stored image, or, comparing in the facial image and the ID card information
Facial image;
It should be noted that above-mentioned pre-stored image can be the facial image of the resident in unit building;
S23: in the comparison twice, when once the comparison is consistent at least within, opening door operation is executed;
It should be noted that when the facial image of acquisition is consistent with pre-stored image, alternatively, the facial image and body of acquisition
When facial image in part card information is consistent, opening door operation is executed.
S24: the facial image and ID card information are compared with the information of the fugitive personnel in public security private network, and
It alarms when comparing consistent, and, when comparing consistent, record sends the facial image and the ID card information
The position of the access control host, and generate according to the position recorded the running track of the fugitive personnel.
In the present embodiment, fugitive personnel institute with the fugitive personnel motion trail of fast track and can be positioned by the safety protection method
In position, in time it is implemented to arrest, improves public security officer and arrest efficiency, while effective guarantee masses'safety.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method
Embodiment in be described in detail, no detailed explanation will be given here.
It is understood that same or similar part can mutually refer in the various embodiments described above, in some embodiments
Unspecified content may refer to the same or similar content in other embodiments.
It should be noted that term " first ", " second " etc. are used for description purposes only in the description of the present application, without
It can be interpreted as indication or suggestion relative importance.In addition, in the description of the present application, unless otherwise indicated, the meaning of " multiple "
Refer at least two.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes
It is one or more for realizing specific logical function or process the step of executable instruction code module, segment or portion
Point, and the range of the preferred embodiment of the application includes other realization, wherein can not press shown or discussed suitable
Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, to execute function, this should be by the application
Embodiment person of ordinary skill in the field understood.
It should be appreciated that each section of the application can be realized with hardware, software, firmware or their combination.Above-mentioned
In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction execution system with storage
Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware
Any one of column technology or their combination are realized: having a logic gates for realizing logic function to data-signal
Discrete logic, with suitable combinational logic gate circuit specific integrated circuit, programmable gate array (PGA), scene
Programmable gate array (FPGA) etc..
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries
It suddenly is that relevant hardware can be instructed to complete by program, the program can store in a kind of computer-readable storage medium
In matter, which when being executed, includes the steps that one or a combination set of embodiment of the method.
It, can also be in addition, can integrate in a processing module in each functional unit in each embodiment of the application
It is that each unit physically exists alone, can also be integrated in two or more units in a module.Above-mentioned integrated mould
Block both can take the form of hardware realization, can also be realized in the form of software function module.The integrated module is such as
Fruit is realized and when sold or used as an independent product in the form of software function module, also can store in a computer
In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example
Point is contained at least one embodiment or example of the application.In the present specification, schematic expression of the above terms are not
Centainly refer to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be any
One or more embodiment or examples in can be combined in any suitable manner.
Although embodiments herein has been shown and described above, it is to be understood that above-described embodiment is example
Property, it should not be understood as the limitation to the application, those skilled in the art within the scope of application can be to above-mentioned
Embodiment is changed, modifies, replacement and variant.
Claims (10)
1. a kind of security system characterized by comprising
All-in-one machine, including face recognition module, ID card information acquisition module and comparison module, the face recognition module are used for
Facial image is acquired, the ID card information acquisition module demonstrate,proves information for captured identity, and the comparison module is for acquiring
The facial image it is consistent with pre-stored image when, or, in the facial image of acquisition and the ID card information of acquisition
In facial image it is consistent when, to access control host send opening signal;
Access control host is communicated to connect with the all-in-one machine, is sent out for receiving the opening signal, and by the opening signal
Give electromagnetic lock;
Electromagnetic lock is connect with the access control main-machine communication, for executing opening door operation after receiving the opening signal;
Server is connect with the access control main-machine communication, the face sent for receiving the access control host
Image and the ID card information, and be compared with the information of the fugitive personnel in public security private network, and when comparing consistent into
Row alarm, and, when comparing consistent, record sends the access control master of the facial image and the ID card information
The position of machine, and generate according to the position recorded the running track of the fugitive personnel.
2. system according to claim 1, which is characterized in that the all-in-one machine, the access control host and the electricity
Magnetic padlock is located in the same local area network.
3. system according to claim 2, which is characterized in that pass through between the all-in-one machine and the access control host
Wired or wireless connection;And/or pass through wired or wireless connection between the access control host and the electromagnetic lock.
4. system according to claim 1, which is characterized in that pass through between the access control host and the server
Cellular mobile network connection.
5. system according to claim 4, which is characterized in that the cellular mobile network is 4G network.
6. system according to claim 1, which is characterized in that the all-in-one machine is located at the outside of door to be opened.
7. system according to claim 1, which is characterized in that the access control host is located at the outer of door to be opened
Face, the inside or inside.
8. system according to claim 1, which is characterized in that the electromagnetic lock is located at the inside of door to be opened.
9. system according to claim 1, which is characterized in that the server is cloud server.
10. a kind of safety protection method characterized by comprising
Acquire facial image and ID card information;
The facial image and pre-stored image are compared, or, comparing the face figure in the facial image and the ID card information
Picture;
In the comparison twice, when once the comparison is consistent at least within, opening door operation is executed;
The facial image and ID card information are compared with the information of the fugitive personnel in public security private network, and comparing one
It alarms when cause, and, when comparing consistent, record sends the gate inhibition of the facial image and the ID card information
The position of host is controlled, and generates the running track of the fugitive personnel according to the position recorded.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810900056.0A CN109147124A (en) | 2018-08-08 | 2018-08-08 | security system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810900056.0A CN109147124A (en) | 2018-08-08 | 2018-08-08 | security system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109147124A true CN109147124A (en) | 2019-01-04 |
Family
ID=64792298
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810900056.0A Pending CN109147124A (en) | 2018-08-08 | 2018-08-08 | security system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109147124A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110298964A (en) * | 2019-06-27 | 2019-10-01 | 江苏派恒节能科技有限公司 | A kind of commercial articles vending machine and its working method with face recognition authentication function |
CN110443919A (en) * | 2019-07-15 | 2019-11-12 | 广东校园卫士网络科技有限责任公司 | A kind of student's disengaging management and candid photograph analysis method based on recognition of face |
CN113538763A (en) * | 2021-06-09 | 2021-10-22 | 青岛海信智慧生活科技股份有限公司 | Entrance guard opening method, intelligent terminal and server |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102663846A (en) * | 2012-05-11 | 2012-09-12 | 尤敦朋 | Intelligent visitor management system based on android operating platform and control method thereof |
CN205507935U (en) * | 2016-02-02 | 2016-08-24 | 杭州悉尔科技有限公司 | Banister automatic control device of people's bank of china based on face identification |
CN106815917A (en) * | 2017-03-27 | 2017-06-09 | 杨建民 | Passenger's management system and method |
KR20170085890A (en) * | 2016-01-15 | 2017-07-25 | 이형용 | System for preventing crime through access control using cctv |
CN206805651U (en) * | 2017-05-12 | 2017-12-26 | 杭州互讯科技有限公司 | Recognition of face visitor's registration integral machine |
CN108171842A (en) * | 2017-12-28 | 2018-06-15 | 深圳市泛海三江科技发展有限公司 | A kind of personnel management system |
-
2018
- 2018-08-08 CN CN201810900056.0A patent/CN109147124A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102663846A (en) * | 2012-05-11 | 2012-09-12 | 尤敦朋 | Intelligent visitor management system based on android operating platform and control method thereof |
KR20170085890A (en) * | 2016-01-15 | 2017-07-25 | 이형용 | System for preventing crime through access control using cctv |
CN205507935U (en) * | 2016-02-02 | 2016-08-24 | 杭州悉尔科技有限公司 | Banister automatic control device of people's bank of china based on face identification |
CN106815917A (en) * | 2017-03-27 | 2017-06-09 | 杨建民 | Passenger's management system and method |
CN206805651U (en) * | 2017-05-12 | 2017-12-26 | 杭州互讯科技有限公司 | Recognition of face visitor's registration integral machine |
CN108171842A (en) * | 2017-12-28 | 2018-06-15 | 深圳市泛海三江科技发展有限公司 | A kind of personnel management system |
Non-Patent Citations (2)
Title |
---|
孟庆博: "《公安信息化技术基础》", 31 January 2018 * |
陈刚: "《现代侦查技战法论坛(第三卷)》", 30 November 2017 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110298964A (en) * | 2019-06-27 | 2019-10-01 | 江苏派恒节能科技有限公司 | A kind of commercial articles vending machine and its working method with face recognition authentication function |
CN110443919A (en) * | 2019-07-15 | 2019-11-12 | 广东校园卫士网络科技有限责任公司 | A kind of student's disengaging management and candid photograph analysis method based on recognition of face |
CN113538763A (en) * | 2021-06-09 | 2021-10-22 | 青岛海信智慧生活科技股份有限公司 | Entrance guard opening method, intelligent terminal and server |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109147124A (en) | security system and method | |
US20210035395A1 (en) | System and method for deploying handheld devices to secure an area | |
CN205880963U (en) | Current management all -in -one of personnel based on people's face, fingerprint and ID card are verified | |
CN201681464U (en) | Prison security system | |
US10535208B2 (en) | Network controlled physical access restriction based upon physiological state | |
Garzia et al. | The integrated security system of the Vatican City State | |
CN105913037A (en) | Face identification and radio frequency identification based monitoring and tracking system | |
CN206097257U (en) | Security protection intelligent monitoring system | |
CN104318389A (en) | Campus dormitory prevention and evacuation safety management system | |
CN105979232A (en) | Video monitoring system for closed school | |
CN110246074A (en) | A kind of community security protection management system and method based on multidimensional acquisition | |
CN207367296U (en) | Personnel tracking device based on bio-identification | |
CN103456065B (en) | A kind of unmanned key management method | |
CN106895553A (en) | Air-conditioning and its control method and device, alarm method and device | |
CN107564225A (en) | A kind of image detection warning system | |
CN105761335A (en) | Gate-sentry management method and system | |
CN109035539A (en) | access control system | |
CN106023545A (en) | Home security system based on voice recognition | |
CN109389107A (en) | Vehicle safety processing method, device and computer readable storage medium | |
CN110363181A (en) | Campus security management system based on AI recognition of face | |
CN210466514U (en) | Intelligent unmanned security inspection channel system | |
CN209373685U (en) | A kind of non-formula entrance guard device based on recognition of face | |
CN109525807A (en) | A kind of application method applied in the intelligent things management system of cell | |
CN106921846A (en) | Video mobile terminal legacy detection means | |
CN112863033A (en) | Method and system for executing face recognition in telecommunication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190104 |