CN109147124A - security system and method - Google Patents

security system and method Download PDF

Info

Publication number
CN109147124A
CN109147124A CN201810900056.0A CN201810900056A CN109147124A CN 109147124 A CN109147124 A CN 109147124A CN 201810900056 A CN201810900056 A CN 201810900056A CN 109147124 A CN109147124 A CN 109147124A
Authority
CN
China
Prior art keywords
facial image
access control
card information
control host
machine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810900056.0A
Other languages
Chinese (zh)
Inventor
黄晓晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dunhuang Jindun Safety Technology Prevention Engineering Co Ltd
Original Assignee
Dunhuang Jindun Safety Technology Prevention Engineering Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dunhuang Jindun Safety Technology Prevention Engineering Co Ltd filed Critical Dunhuang Jindun Safety Technology Prevention Engineering Co Ltd
Priority to CN201810900056.0A priority Critical patent/CN109147124A/en
Publication of CN109147124A publication Critical patent/CN109147124A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration

Abstract

This application involves a kind of security systems, it include: all-in-one machine, including face recognition module, ID card information acquisition module and comparison module, face recognition module is for acquiring facial image, ID card information acquisition module demonstrate,proves information for captured identity, and comparison module is used for when the facial image of acquisition is consistent with pre-stored image, or, when the facial image of acquisition is consistent with the facial image in the ID card information of acquisition, opening signal is sent to access control host;Access control host communicates to connect with all-in-one machine, is sent to electromagnetic lock for receiving opening signal, and by opening signal;Electromagnetic lock is connect with access control main-machine communication, for executing opening door operation after receiving opening signal;Server is connect with access control main-machine communication, for receiving the facial image and ID card information of the transmission of access control host, and is compared with the information of the fugitive personnel in public security private network, and is alarmed when comparing consistent, and fugitive personnel positions are tracked.

Description

Security system and method
Technical field
This application involves intelligent safety protection technical field more particularly to a kind of security systems and method.
Background technique
Social security refers to the stable order of society, but always has lawless people not abide by social security requirement, therefore, it is related Technical staff develops security system.
In the related technology, security system can only generally register the identity information of corresponding personnel by identity card, but cannot protect The identity information of card registration is exactly the identity information for holding identity witness, provides to fugitive personnel and escapes opportunity, it cannot be guaranteed that group Many safety.
Summary of the invention
To be overcome the problems, such as present in the relevant technologies at least to a certain extent, the application provides a kind of security system and side Method.
According to the embodiment of the present application in a first aspect, provide a kind of security system, including all-in-one machine, including recognition of face mould Block, ID card information acquisition module and comparison module, the face recognition module is for acquiring facial image, the identity card letter It ceases acquisition module and demonstrate,proves information for captured identity, the comparison module is used for the facial image and pre-stored image one in acquisition When cause, or, being controlled when the facial image of acquisition is consistent with the facial image in the ID card information of acquisition to gate inhibition Host processed sends opening signal;
Access control host is communicated to connect with the all-in-one machine, is believed for receiving the opening signal, and by the enabling Number it is sent to electromagnetic lock;
Electromagnetic lock is connect with the access control main-machine communication, for executing the behaviour that opens the door after receiving the opening signal Make;
Server is connect with the access control main-machine communication, for receiving described in the access control host transmission Facial image and the ID card information, and be compared with the information of the fugitive personnel in public security private network, and consistent comparing Shi Jinhang alarm, and, when comparing consistent, record sends the gate inhibition control of the facial image and the ID card information The position of host processed, and generate according to the position recorded the running track of the fugitive personnel.
Optionally, the all-in-one machine, the access control host and the electromagnetic lock are located in the same local area network.
Optionally, pass through wired or wireless connection between the all-in-one machine and the access control host;And/or it is described Pass through wired or wireless connection between access control host and the electromagnetic lock.
Optionally, it is connected between the access control host and the server by cellular mobile network.
Optionally, the cellular mobile network is 4G network.
Optionally, the all-in-one machine is located at the outside of door to be opened.
Optionally, the access control host is located at outside, the inside or the inside of door to be opened.
Optionally, the electromagnetic lock is located at the inside of door to be opened.
Optionally, the server is cloud server.
According to the second aspect of the embodiment of the present application, a kind of safety protection method is provided, comprising: acquisition facial image and identity card Information;
Compare the facial image in the facial image and ID card information;
When the two is consistent, opening door operation is executed;
In the comparison twice, when once the comparison is consistent at least within, opening door operation is executed;
The facial image and ID card information are compared with the information of the fugitive personnel in public security private network, and than To it is consistent when alarm, and, when comparing consistent, record sends the described of the facial image and the ID card information The position of access control host, and generate according to the position recorded the running track of the fugitive personnel.
Technical solution provided by the present application can include the following benefits:
It is served as theme with facial image, facial image is compared by recognition of face video camera or identity card reader, confirms quilt The identity information for comparing people, after comparing successfully, access control host controls door and opens, while facial image is sent to server Face database be compared, if the facial image of fugitive personnel, then automatic alarm, if not the facial image of fugitive personnel, then It does not alarm.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The application can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the application Example, and together with specification it is used to explain the principle of the application.
Fig. 1 is the structural schematic diagram for the security system that the application one embodiment provides;
Fig. 2 is the flow chart for the security system that the application another real-time example provides.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the application.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the application.
Fig. 1 is the structural schematic diagram for the security system that the application one embodiment provides.As shown in Figure 1, the security system Include:
All-in-one machine 11, including face recognition module 111, ID card information acquisition module 112 and comparison module 113, it is described Face recognition module 111 demonstrate,proves information for captured identity for acquiring facial image, the ID card information acquisition module 112, The comparison module 113 is used for when the facial image of acquisition is consistent with pre-stored image, or, in the face figure of acquisition When picture is consistent with the facial image in the ID card information of acquisition, opening signal is sent to access control host;
Access control host 12 is communicated to connect with the all-in-one machine 11, is opened for receiving the opening signal, and by described Gate signal is sent to electromagnetic lock;
Electromagnetic lock 13 is communicated to connect with the access control host 12, is opened for receiving to execute after the opening signal Door operation;
Server 14 is communicated to connect with the access control host 12, is sent for receiving the access control host 12 The facial image and the ID card information, and be compared with the information of the fugitive personnel in public security private network, and than To it is consistent when alarm, and, when comparing consistent, record sends the described of the facial image and the ID card information The position of access control host, and generate according to the position recorded the running track of the fugitive personnel.
It should be noted that above-mentioned all-in-one machine integrates recognition of face, ID card information read functions, above-mentioned one Machine, access control host, electromagnetic lock can be installed on neighbouring cell unit door, office building doorway or school Office Area etc..On Stating face recognition module further includes camera, for shooting the facial image of visiting personnel, above-mentioned ID card information acquisition module Using current technology, similar at the train station or when safety check is crossed on airport, brush identity card reads people's identity information and simultaneously images comparison Technology.The face information library of the fugitive personnel of above-mentioned server and public security private network communicates to connect, can be on backstage when server is alarmed Face information library software page pop-up alarm dialog box.
Above-mentioned pre-stored image can be the facial image of resident in unit building, and the facial image of above-mentioned acquisition can be resident Facial image, or the facial image of any nonnative personnel, when resident is into building, all-in-one machine acquires resident's facial image, And be compared with pre-stored image, when comparing consistent, opening signal is sent, when nonnative personnel is into building, all-in-one machine needs to acquire it Facial image and ID card information, and the facial image of acquisition is compared with the facial image in ID card information, than To it is consistent when, send open the door it is information-based.
In the present embodiment, which passes through face figure by acquisition facial image and ID card information two ways As comparing with pre-stored image, the facial image in facial image and ID card information compares, the primary comparison in comparison twice When consistent, opening signal is sent to access control host, access control host sends opening signal after receiving opening signal To electromagnetic lock, electromagnetic lock opens the door, and server receives the facial image and ID card information that access control host is sent, and with it is fugitive Face information in the face information library of personnel is compared, and compares consistent alarm and is tracked to fugitive personnel positions and determines Position, with the fugitive personnel motion trail of fast track and can position fugitive personnel position, implement to arrest to it in time, improve Public security officer arrests efficiency, while effective guarantee masses'safety.
In some embodiments, the all-in-one machine, the access control host and the electromagnetic lock are located at the same local area network In.
In the present embodiment, all-in-one machine, gate inhibition's host, electromagnetic lock and server can be all located at same local area network, convenient for being somebody's turn to do Security system carries out information exchange.
In some embodiments, pass through wired or wireless connection between the all-in-one machine and the access control host;With/ Or, passing through wired or wireless connection between the access control host and the electromagnetic lock.
It should be noted that above-mentioned wireless connection can be 4G (the 4th Generation mobile Communication technology, fourth generation mobile communication technology) communication connection, or WiFi (WIreless- FIdelity, Wireless Fidelity) connection.
In the present embodiment, it can pass through between all-in-one machine and access control host, between access control host and electromagnetic lock A variety of connection type connections, increase the diversity of system mount scheme, enhance exploitativeness.
In some embodiments, connected between the access control host and the server by cellular mobile network.
Specifically, the cellular mobile network is 4G network.
It should be noted that above-mentioned cellular mobile network is using cellular radio networking mode, in terminal and the network equipment Between connected by radio channel, and then realize that equipment room is in communication with each other.
It, can also in the case where terminal is mobile device by using cellular mobile network connection type in the present embodiment To realize telecommunication.
In some embodiments, the all-in-one machine is located at the outside of door to be opened.
It should be noted that above-mentioned door to be opened can be door, office building gate, school gate or the school of unit building The door in classroom.
In the present embodiment, all-in-one machine is located to the outside of door to be opened, nonnative personnel needs collected in the outside of door Facial image can just enter in door after comparing unanimously, can be with effective guarantee personnel safety.
In some embodiments, the access control host is located at outside, the inside or the inside of door to be opened.
It is integrated, can also be provided separately in door it should be noted that access control host can be arranged with all-in-one machine Face also can be set inside door.
In the present embodiment, the diversity and exploitativeness for increasing scheme in multiple positions is can be set in access control host.
In some embodiments, the electromagnetic lock is located at the inside of door to be opened.
It should be noted that above-mentioned electromagnetic lock is set to the inside of door body to be opened.
In the present embodiment, electromagnetic lock is set to the inside with open door, reduces the rate of decay of electromagnetic lock and by people A possibility that destroy.
In some embodiments, the server is cloud server.
It should be noted that above-mentioned server is connect with public security private network communication, it can be from the face information library of public security private network It is middle to obtain fugitive personal information, it is compared with the facial image of all-in-one machine acquisition.
In the present embodiment, by the way that cloud server is arranged, the face of the facial image of acquisition and public security private network can be believed The facial image of fugitive personnel is compared in breath library, thereby determines that whether the people of collected facial image is fugitive personnel, if It is then to alarm, and count fugitive personnel motion trail, determines fugitive personnel positions.
Fig. 2 be the application the other is the safety protection method that embodiment provides flow chart.This method comprises the following steps:
S21: acquisition facial image and ID card information;
It should be noted that above-mentioned acquisition facial image can be acquired by camera;
S22: comparing the facial image and pre-stored image, or, comparing in the facial image and the ID card information Facial image;
It should be noted that above-mentioned pre-stored image can be the facial image of the resident in unit building;
S23: in the comparison twice, when once the comparison is consistent at least within, opening door operation is executed;
It should be noted that when the facial image of acquisition is consistent with pre-stored image, alternatively, the facial image and body of acquisition When facial image in part card information is consistent, opening door operation is executed.
S24: the facial image and ID card information are compared with the information of the fugitive personnel in public security private network, and It alarms when comparing consistent, and, when comparing consistent, record sends the facial image and the ID card information The position of the access control host, and generate according to the position recorded the running track of the fugitive personnel.
In the present embodiment, fugitive personnel institute with the fugitive personnel motion trail of fast track and can be positioned by the safety protection method In position, in time it is implemented to arrest, improves public security officer and arrest efficiency, while effective guarantee masses'safety.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
It is understood that same or similar part can mutually refer in the various embodiments described above, in some embodiments Unspecified content may refer to the same or similar content in other embodiments.
It should be noted that term " first ", " second " etc. are used for description purposes only in the description of the present application, without It can be interpreted as indication or suggestion relative importance.In addition, in the description of the present application, unless otherwise indicated, the meaning of " multiple " Refer at least two.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes It is one or more for realizing specific logical function or process the step of executable instruction code module, segment or portion Point, and the range of the preferred embodiment of the application includes other realization, wherein can not press shown or discussed suitable Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, to execute function, this should be by the application Embodiment person of ordinary skill in the field understood.
It should be appreciated that each section of the application can be realized with hardware, software, firmware or their combination.Above-mentioned In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction execution system with storage Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware Any one of column technology or their combination are realized: having a logic gates for realizing logic function to data-signal Discrete logic, with suitable combinational logic gate circuit specific integrated circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries It suddenly is that relevant hardware can be instructed to complete by program, the program can store in a kind of computer-readable storage medium In matter, which when being executed, includes the steps that one or a combination set of embodiment of the method.
It, can also be in addition, can integrate in a processing module in each functional unit in each embodiment of the application It is that each unit physically exists alone, can also be integrated in two or more units in a module.Above-mentioned integrated mould Block both can take the form of hardware realization, can also be realized in the form of software function module.The integrated module is such as Fruit is realized and when sold or used as an independent product in the form of software function module, also can store in a computer In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is contained at least one embodiment or example of the application.In the present specification, schematic expression of the above terms are not Centainly refer to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be any One or more embodiment or examples in can be combined in any suitable manner.
Although embodiments herein has been shown and described above, it is to be understood that above-described embodiment is example Property, it should not be understood as the limitation to the application, those skilled in the art within the scope of application can be to above-mentioned Embodiment is changed, modifies, replacement and variant.

Claims (10)

1. a kind of security system characterized by comprising
All-in-one machine, including face recognition module, ID card information acquisition module and comparison module, the face recognition module are used for Facial image is acquired, the ID card information acquisition module demonstrate,proves information for captured identity, and the comparison module is for acquiring The facial image it is consistent with pre-stored image when, or, in the facial image of acquisition and the ID card information of acquisition In facial image it is consistent when, to access control host send opening signal;
Access control host is communicated to connect with the all-in-one machine, is sent out for receiving the opening signal, and by the opening signal Give electromagnetic lock;
Electromagnetic lock is connect with the access control main-machine communication, for executing opening door operation after receiving the opening signal;
Server is connect with the access control main-machine communication, the face sent for receiving the access control host Image and the ID card information, and be compared with the information of the fugitive personnel in public security private network, and when comparing consistent into Row alarm, and, when comparing consistent, record sends the access control master of the facial image and the ID card information The position of machine, and generate according to the position recorded the running track of the fugitive personnel.
2. system according to claim 1, which is characterized in that the all-in-one machine, the access control host and the electricity Magnetic padlock is located in the same local area network.
3. system according to claim 2, which is characterized in that pass through between the all-in-one machine and the access control host Wired or wireless connection;And/or pass through wired or wireless connection between the access control host and the electromagnetic lock.
4. system according to claim 1, which is characterized in that pass through between the access control host and the server Cellular mobile network connection.
5. system according to claim 4, which is characterized in that the cellular mobile network is 4G network.
6. system according to claim 1, which is characterized in that the all-in-one machine is located at the outside of door to be opened.
7. system according to claim 1, which is characterized in that the access control host is located at the outer of door to be opened Face, the inside or inside.
8. system according to claim 1, which is characterized in that the electromagnetic lock is located at the inside of door to be opened.
9. system according to claim 1, which is characterized in that the server is cloud server.
10. a kind of safety protection method characterized by comprising
Acquire facial image and ID card information;
The facial image and pre-stored image are compared, or, comparing the face figure in the facial image and the ID card information Picture;
In the comparison twice, when once the comparison is consistent at least within, opening door operation is executed;
The facial image and ID card information are compared with the information of the fugitive personnel in public security private network, and comparing one It alarms when cause, and, when comparing consistent, record sends the gate inhibition of the facial image and the ID card information The position of host is controlled, and generates the running track of the fugitive personnel according to the position recorded.
CN201810900056.0A 2018-08-08 2018-08-08 security system and method Pending CN109147124A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810900056.0A CN109147124A (en) 2018-08-08 2018-08-08 security system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810900056.0A CN109147124A (en) 2018-08-08 2018-08-08 security system and method

Publications (1)

Publication Number Publication Date
CN109147124A true CN109147124A (en) 2019-01-04

Family

ID=64792298

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810900056.0A Pending CN109147124A (en) 2018-08-08 2018-08-08 security system and method

Country Status (1)

Country Link
CN (1) CN109147124A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110298964A (en) * 2019-06-27 2019-10-01 江苏派恒节能科技有限公司 A kind of commercial articles vending machine and its working method with face recognition authentication function
CN110443919A (en) * 2019-07-15 2019-11-12 广东校园卫士网络科技有限责任公司 A kind of student's disengaging management and candid photograph analysis method based on recognition of face
CN113538763A (en) * 2021-06-09 2021-10-22 青岛海信智慧生活科技股份有限公司 Entrance guard opening method, intelligent terminal and server

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102663846A (en) * 2012-05-11 2012-09-12 尤敦朋 Intelligent visitor management system based on android operating platform and control method thereof
CN205507935U (en) * 2016-02-02 2016-08-24 杭州悉尔科技有限公司 Banister automatic control device of people's bank of china based on face identification
CN106815917A (en) * 2017-03-27 2017-06-09 杨建民 Passenger's management system and method
KR20170085890A (en) * 2016-01-15 2017-07-25 이형용 System for preventing crime through access control using cctv
CN206805651U (en) * 2017-05-12 2017-12-26 杭州互讯科技有限公司 Recognition of face visitor's registration integral machine
CN108171842A (en) * 2017-12-28 2018-06-15 深圳市泛海三江科技发展有限公司 A kind of personnel management system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102663846A (en) * 2012-05-11 2012-09-12 尤敦朋 Intelligent visitor management system based on android operating platform and control method thereof
KR20170085890A (en) * 2016-01-15 2017-07-25 이형용 System for preventing crime through access control using cctv
CN205507935U (en) * 2016-02-02 2016-08-24 杭州悉尔科技有限公司 Banister automatic control device of people's bank of china based on face identification
CN106815917A (en) * 2017-03-27 2017-06-09 杨建民 Passenger's management system and method
CN206805651U (en) * 2017-05-12 2017-12-26 杭州互讯科技有限公司 Recognition of face visitor's registration integral machine
CN108171842A (en) * 2017-12-28 2018-06-15 深圳市泛海三江科技发展有限公司 A kind of personnel management system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
孟庆博: "《公安信息化技术基础》", 31 January 2018 *
陈刚: "《现代侦查技战法论坛(第三卷)》", 30 November 2017 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110298964A (en) * 2019-06-27 2019-10-01 江苏派恒节能科技有限公司 A kind of commercial articles vending machine and its working method with face recognition authentication function
CN110443919A (en) * 2019-07-15 2019-11-12 广东校园卫士网络科技有限责任公司 A kind of student's disengaging management and candid photograph analysis method based on recognition of face
CN113538763A (en) * 2021-06-09 2021-10-22 青岛海信智慧生活科技股份有限公司 Entrance guard opening method, intelligent terminal and server

Similar Documents

Publication Publication Date Title
CN109147124A (en) security system and method
US20210035395A1 (en) System and method for deploying handheld devices to secure an area
CN205880963U (en) Current management all -in -one of personnel based on people's face, fingerprint and ID card are verified
CN201681464U (en) Prison security system
US10535208B2 (en) Network controlled physical access restriction based upon physiological state
Garzia et al. The integrated security system of the Vatican City State
CN105913037A (en) Face identification and radio frequency identification based monitoring and tracking system
CN206097257U (en) Security protection intelligent monitoring system
CN104318389A (en) Campus dormitory prevention and evacuation safety management system
CN105979232A (en) Video monitoring system for closed school
CN110246074A (en) A kind of community security protection management system and method based on multidimensional acquisition
CN207367296U (en) Personnel tracking device based on bio-identification
CN103456065B (en) A kind of unmanned key management method
CN106895553A (en) Air-conditioning and its control method and device, alarm method and device
CN107564225A (en) A kind of image detection warning system
CN105761335A (en) Gate-sentry management method and system
CN109035539A (en) access control system
CN106023545A (en) Home security system based on voice recognition
CN109389107A (en) Vehicle safety processing method, device and computer readable storage medium
CN110363181A (en) Campus security management system based on AI recognition of face
CN210466514U (en) Intelligent unmanned security inspection channel system
CN209373685U (en) A kind of non-formula entrance guard device based on recognition of face
CN109525807A (en) A kind of application method applied in the intelligent things management system of cell
CN106921846A (en) Video mobile terminal legacy detection means
CN112863033A (en) Method and system for executing face recognition in telecommunication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190104