CN109242741A - A kind of whole nation wanted circular personal identification networking alarm method and system based on cloud lock - Google Patents
A kind of whole nation wanted circular personal identification networking alarm method and system based on cloud lock Download PDFInfo
- Publication number
- CN109242741A CN109242741A CN201810885413.0A CN201810885413A CN109242741A CN 109242741 A CN109242741 A CN 109242741A CN 201810885413 A CN201810885413 A CN 201810885413A CN 109242741 A CN109242741 A CN 109242741A
- Authority
- CN
- China
- Prior art keywords
- cloud lock
- user
- whole nation
- module
- arrest
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 230000006855 networking Effects 0.000 title claims abstract description 17
- 238000004891 communication Methods 0.000 claims abstract description 17
- 210000000056 organ Anatomy 0.000 claims description 10
- 230000006698 induction Effects 0.000 claims description 5
- 239000004575 stone Substances 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Development Economics (AREA)
- General Business, Economics & Management (AREA)
- Life Sciences & Earth Sciences (AREA)
- Economics (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- Biomedical Technology (AREA)
- Educational Administration (AREA)
- Biodiversity & Conservation Biology (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Medical Informatics (AREA)
- Alarm Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Lock And Its Accessories (AREA)
Abstract
A kind of whole nation wanted circular personal identification networking alarm method based on cloud lock, include the following steps: step A: cloud lock carries out identification verifying to user;Step B: judging whether the user is illegal user, if the user is not illegal user, cloud locks normal release;If the user is illegal user, C is entered step;Step C: the backstage of cloud lock saves the identity characteristic data of the illegal user, and cloud lock is ordered to arrest demographic data library with the whole nation by communication network and connect, and the identity characteristic data of the illegal user are ordered to arrest the identity characteristic data in demographic data library with the whole nation and are compared;Step D: if the identity characteristic data in the illegal user in step C can be fit to the identity characteristic data in the wanted circular demographic data library of the whole nation; cloud lock then makes alarm or warning operation; it can be improved the reliability and safety of cloud lock; more fully the protection user person and property safety, but also arrest criminal for Ministry of Public Security law enfrocement official and very very accurately assistance in time is provided.
Description
Technical field
The present invention relates to cloud lock technology fields more particularly to a kind of whole nation based on cloud lock to order to arrest personal identification network alarm
Method and system.
Background technique
Although what the intelligent cloud at present with recognition of face was locked, which popularizes, has brought very big convenience, social condition is multiple
It is miscellaneous, have the convenience that the undesirable people of the vertical heart is not necessarily to key using intelligent cloud lock, it is intended to crack intelligent cloud from outside and be locked into within doors
Illegal business is carried out, is threatened to user.
Summary of the invention
It is an object of the invention to propose that personal identification networking alarm method and system are ordered to arrest in a kind of whole nation based on cloud lock,
The reliability and safety of raising cloud lock, more fully the protection user person and property safety, but also be Ministry of Public Security law enforcement people
Member arrests criminal and provides very very accurately assistance in time, kills two birds with one stone.
To achieve this purpose, the present invention adopts the following technical scheme:
A kind of whole nation wanted circular personal identification networking alarm method based on cloud lock, includes the following steps:
Step A: cloud lock carries out identification verifying to user;
Step B: judging whether the user is illegal user, if the user is not illegal user, cloud locks normal release;If
The user is illegal user, then enters step C;
Step C: the backstage of cloud lock saves the identity characteristic data of the illegal user, and cloud lock is logical by communication network and the whole nation
The connection of demographic data library is seized, and the identity characteristic data of the illegal user and the whole nation are ordered to arrest to the identity characteristic in demographic data library
Data compare;
Step D: if the identity characteristic data of the illegal user in step C can be fit to the whole nation and order to arrest demographic data
Identity characteristic data in library, cloud lock then make alarm or warning operation.
Further,
In step D, cloud lock then makes the detailed process of alarm are as follows:
The human face photo that cloud lock sends alarm command and the illegal user is alarmed to intelligent terminal by intelligent terminal
With notify user.
Further,
In step D, cloud lock then makes the detailed process of alarm are as follows:
Cloud lock is connected to public security organ's server by communication network and alarms.
Further,
In step D, cloud lock makes the detailed process of warning are as follows:
Cloud lock makes warning by acousto-optic hint.
Further,
In step D, if the identity characteristic data of the illegal user in step C can not be fit to the whole nation and order to arrest people
Identity characteristic data in member's database, human face photo to the intelligent terminal that cloud lock sends the illegal user notify user.
Further,
In step D, after the human face photo that cloud lock sends the illegal user notifies user to intelligent terminal, user passes through
Intelligent terminal is communicatively coupled with cloud lock, and is sent unlocking instruction to cloud and locked, and unlocking operation is carried out.
Further,
In stepb, if the user is not illegal user, cloud locks normal release, specific unlocking process are as follows:
Countdown module in cloud lock carries out countdown, and the countdown module is after countdown to preset time, cloud
The infrared induction mold of lock still senses there is user in front of the door, then the cloud lock unlock, door are opened.
The system for ordering to arrest personal identification networking alarm method using the whole nation based on cloud lock,
Demographic data library is ordered to arrest including cloud lock and the whole nation;
The cloud lock includes identification module, judgment module, background module, communication module, comparison module, alarm module
And alert module;
The identification module, for carrying out identification verifying to user;
The judgment module, for judging that the identity of active user is normal users either illegal user;
The background module, for saving the identity characteristic data of illegal user;
The communication module is ordered to arrest demographic data library with the whole nation for cloud lock and is communicatively coupled;
The comparison module, for the identity characteristic data of the illegal user and the whole nation to be ordered to arrest to the body in demographic data library
Part characteristic compares;
The alarm module, the identity characteristic data for the illegal user can be fit to the whole nation and order to arrest demographic data library
In identity characteristic data when, make alarm operation;
The alert module, the identity characteristic data for the illegal user can be fit to the whole nation and order to arrest demographic data library
In identity characteristic data when, make warning operation.
Further,
It further include intelligent terminal and public security organ's server;
Cloud lock further includes sending module;
The sending module is used to send the human face photo of alarm command and the illegal user to intelligent terminal, passes through intelligence
User is alarmed and notified to terminal;
Alternatively, cloud lock is connected to public security organ's server by communication network and alarms.
Further,
The cloud lock further includes countdown module and infrared sensor module;
The countdown module is used for countdown;
The infrared sensor module is for incuding user.
The present invention proposes that a kind of whole nation based on cloud lock is ordered to arrest according to above content
System improves the reliability and safety of cloud lock, more fully the protection user person and property safety, but also enforces the law for the Ministry of Public Security
Personnel arrest criminal and provide very very accurately assistance in time, kill two birds with one stone.
Detailed description of the invention
Fig. 1 is the flow chart of the one of embodiment of the present invention;
Fig. 2 is the system diagram of the one of embodiment of the present invention.
Wherein: cloud locks 1, identification module 11, judgment module 12, background module 13, communication module 14, comparison module
15, alarm module 16, alert module 17, sending module 18, sound flash alarm system module 19, countdown module 19, infrared sensor module
101, demographic data library 2, intelligent terminal 3, public security organ's server 4 are ordered to arrest in the whole nation.
Specific embodiment
To further illustrate the technical scheme of the present invention below with reference to the accompanying drawings and specific embodiments.
A kind of whole nation wanted circular personal identification networking alarm method based on cloud lock, includes the following steps:
Step A: cloud locks 1 couple of user and carries out identification verifying;
Step B: judging whether the user is illegal user, if the user is not illegal user, cloud locks 1 normal release;
If the user is illegal user, C is entered step;
Step C: the backstage of cloud lock 1 saves the identity characteristic data of the illegal user, and cloud lock 1 passes through communication network and the whole nation
It orders to arrest demographic data library 2 to connect, and the identity characteristic data of the illegal user and the whole nation is ordered to arrest to the identity in demographic data library 2
Characteristic compares;
Step D: if the identity characteristic data of the illegal user in step C can be fit to the whole nation and order to arrest demographic data
Identity characteristic data in library 2, cloud lock 1 then make alarm or warning operation.
Cloud locks 1 couple of user and carries out identification verifying, and the mode of verifying can be tested for recognition of face verifying, fingerprint recognition
Card, key feeding cipher verifying etc., and the present embodiment cloud lock 1 uses recognition of face to verify, the identity characteristic data verified
It is shape of face characteristic.
If normal user, then 1 verifying can be locked by cloud, cloud lock 1 can normal release;If illegal user, cloud lock 1
There is no the shape of face characteristic of these illegal users is stored in advance, if there is illegal user to attempt to unlock, at this moment, after cloud lock 1
Platform saves the shape of face characteristic of the illegal user, and cloud lock 1 is ordered to arrest demographic data library 2 with the whole nation by communication network and connect, and
The shape of face characteristic of the illegal user is ordered to arrest the shape of face characteristic in demographic data library 2 with the whole nation to compare, if should
The shape of face characteristic of illegal user can be fit to the shape of face characteristic in the wanted circular demographic data library 2 of the whole nation, and cloud lock 1 is then made
Operation is alarmed or alerted out, the reliability and safety of cloud lock 1, more fully the protection user person and property safety are improved, and
And also arrest criminal for Ministry of Public Security law enfrocement official and very very accurately assistance in time is provided, it kills two birds with one stone.
Further,
In step D, cloud lock 1 then makes the detailed process of alarm are as follows:
The human face photo that cloud lock 1 sends alarm command and the illegal user is carried out to intelligent terminal 3 by intelligent terminal 3
Alarm and notify user.
On the one hand it can efficiently and rapidly alarm, user on the other hand can be allowed to be clear from the face appearance of illegal user,
Improve the vigilance of user.When there is illegal user to attempt to be unlocked cloud lock 1, cloud lock 1 can capture the people of the illegal user
Face photo.
Further,
In step D, cloud lock 1 then makes the detailed process of alarm are as follows:
Cloud lock 1 is connected to public security organ's server 4 by communication network and alarms.
Realization is more quickly and efficiently alarmed, and protects the person and property safety of user at the first time.
Further,
In step D, cloud lock 1 makes the detailed process of warning are as follows:
Cloud lock 1 makes warning by acousto-optic hint.
Play the role of alerting the illegal user.
Further,
In step D, if the identity characteristic data of the illegal user in step C can not be fit to the whole nation and order to arrest people
Identity characteristic data in member's database 2, human face photo to the intelligent terminal 3 that cloud lock 1 sends the illegal user notify user.
If the identity characteristic data of the illegal user in step C can not be fit to the whole nation and order to arrest demographic data library 2
In identity characteristic data, then the illegal user is likely to be visitor, can inform the identity information of owner visitor in time, main
People, which understands, has visitor to arrive, and can securely open the door, and relievedly receives visitor.
Further,
In step D, after the human face photo that cloud lock 1 sends the illegal user notifies user to intelligent terminal 3, Yong Hutong
It crosses intelligent terminal 3 to be communicatively coupled with cloud lock 1, and sends unlocking instruction to cloud lock 1, carry out unlocking operation.
After user has checked the human face photo of the illegal user, if the illegal user is the friend being very familiar with, and householder
Temporarily stay out again in, user is communicatively coupled by intelligent terminal 3 and cloud lock 1 at this time, and is sent unlocking instruction to cloud and locked
1, unlocking operation is carried out, visitor is allowed first to enter house rest, visitor's long-time is avoided to wait outdoors.
In another example householder is just busy at home, inconvenient to open the door at door, user passes through intelligent terminal 3 and cloud at this time for this
Lock 1 is communicatively coupled, and sends unlocking instruction to cloud lock 1, carries out unlocking operation, progress unlocking operation is convenient and efficient.
Further,
In stepb, if the user is not illegal user, cloud locks 1 normal release, specific unlocking process are as follows:
Countdown module in cloud lock 1 carries out countdown, and the countdown module is after countdown to preset time, cloud
The infrared induction mold of lock 1 still senses there is user in front of the door, then 1 unlock of cloud lock, door are opened.
The preset countdown of countdown module described in the present embodiment be the time be 2 seconds, it is assumed that the countdown module is fallen
After having counted 2 seconds, user still in front of the door, then proves there is enabling sign, at this point, the infrared induction mold still senses user
Have visitor, then cloud lock 1 can just unlock, and Men Caihui is opened, in this case, can accomplish to accurately identify enabling sign and from
It is dynamic to open the door, the intelligence of cloud lock 1 is promoted, makes user more convenient to use.
The system for ordering to arrest personal identification networking alarm method using the whole nation based on cloud lock, including cloud lock 1 and complete
State orders to arrest demographic data library 2;
The cloud lock 1 includes identification module 11, judgment module 12, background module 13, communication module 14, comparison module
15, alarm module 16 and alert module 17;
The identification module 11, for carrying out identification verifying to user;
The judgment module 12, for judging that the identity of active user is normal users either illegal user;
The background module 13, for saving the identity characteristic data of illegal user;
The communication module 14 is ordered to arrest demographic data library 2 with the whole nation for cloud lock 1 and is communicatively coupled;
The comparison module 15, for ordering to arrest the identity characteristic data of the illegal user and the whole nation in demographic data library 2
Identity characteristic data compare;
The alarm module 16, the identity characteristic data for the illegal user can be fit to the whole nation and order to arrest demographic data
When identity characteristic data in library 2, alarm operation is made;
The alert module 17, the identity characteristic data for the illegal user can be fit to the whole nation and order to arrest demographic data
When identity characteristic data in library 2, warning operation is made.
System by ordering to arrest personal identification networking alarm method based on the whole nation that cloud is locked, more fully the protection user person
And property safety, but also arrest criminal for Ministry of Public Security law enfrocement official and very very accurately assistance in time is provided, it kills two birds with one stone.
Further,
It further include intelligent terminal 3 and public security organ's server 4;
Cloud lock 1 further includes sending module 18;
The sending module 18 is used to send the human face photo of alarm command and the illegal user to intelligent terminal 3, passes through
User is alarmed and notified to intelligent terminal 3;
Alternatively, cloud lock 1 is connected to public security organ's server 4 by communication network and alarms.
On the one hand it can efficiently and rapidly alarm, user on the other hand can be allowed to be clear from the face appearance of illegal user,
Improve the vigilance of user.When there is illegal user to attempt to be unlocked cloud lock 1, cloud lock 1 can capture the people of the illegal user
Face photo protects the person and property safety of user at the first time.
Further,
The cloud lock 1 further includes countdown module 19 and infrared sensor module 101;
The countdown module 19 is used for countdown;
The infrared sensor module 101 is for incuding user.
The preset countdown of countdown module described in the present embodiment be the time be 2 seconds, it is assumed that the countdown module is fallen
After having counted 2 seconds, user still in front of the door, then proves there is enabling sign, at this point, the infrared induction mold still senses user
Have visitor, then cloud lock 1 can just unlock, and Men Caihui is opened, in this case, can accomplish to accurately identify enabling sign and from
It is dynamic to open the door, the intelligence of cloud lock 1 is promoted, makes user more convenient to use.
The technical principle of the invention is described above in combination with a specific embodiment.These descriptions are intended merely to explain of the invention
Principle, and shall not be construed in any way as a limitation of the scope of protection of the invention.Based on the explanation herein, the technology of this field
Personnel can associate with other specific embodiments of the invention without creative labor, these modes are fallen within
Within protection scope of the present invention.
Claims (10)
1. personal identification networking alarm method is ordered to arrest in a kind of whole nation based on cloud lock, characterized by the following steps:
Step A: cloud lock carries out identification verifying to user;
Step B: judging whether the user is illegal user, if the user is not illegal user, cloud locks normal release;If the use
Family is illegal user, then enters step C;
Step C: the backstage of cloud lock saves the identity characteristic data of the illegal user, and cloud lock orders to arrest people by communication network and the whole nation
Member's database connects, and the identity characteristic data of the illegal user and the whole nation are ordered to arrest to the identity characteristic data in demographic data library
It compares;
Step D: if the identity characteristic data in the illegal user in step C can be fit in the wanted circular demographic data library of the whole nation
Identity characteristic data, cloud lock then makes alarm or warning operation.
2. personal identification networking alarm method is ordered to arrest in a kind of whole nation based on cloud lock according to claim 1, feature exists
In:
In step D, cloud lock then makes the detailed process of alarm are as follows:
The human face photo that cloud lock sends alarm command and the illegal user is alarmed and is led to by intelligent terminal to intelligent terminal
Know user.
3. personal identification networking alarm method is ordered to arrest in a kind of whole nation based on cloud lock according to claim 1, feature exists
In:
In step D, cloud lock then makes the detailed process of alarm are as follows:
Cloud lock is connected to public security organ's server by communication network and alarms.
4. personal identification networking alarm method is ordered to arrest in a kind of whole nation based on cloud lock according to claim 1, feature exists
In:
In step D, cloud lock makes the detailed process of warning are as follows:
Cloud lock makes warning by acousto-optic hint.
5. personal identification networking alarm method is ordered to arrest in a kind of whole nation based on cloud lock according to claim 1, feature exists
In:
In step D, if the identity characteristic data of the illegal user in step C can not be fit to national wanted circular personnel number
According to the identity characteristic data in library, human face photo to the intelligent terminal that cloud lock sends the illegal user notifies user.
6. personal identification networking alarm method is ordered to arrest in a kind of whole nation based on cloud lock according to claim 1, feature exists
In:
In step D, after the human face photo that cloud lock sends the illegal user notifies user to intelligent terminal, user passes through intelligence
Terminal is communicatively coupled with cloud lock, and is sent unlocking instruction to cloud and locked, and unlocking operation is carried out.
7. personal identification networking alarm method is ordered to arrest in a kind of whole nation based on cloud lock according to claim 1, feature exists
In:
In stepb, if the user is not illegal user, cloud locks normal release, specific unlocking process are as follows:
Cloud lock in countdown module carry out countdown, the countdown module after countdown to preset time, cloud lock
Infrared induction mold still senses user in front of the door, then the cloud lock unlock, door are opened.
8. ordering to arrest personal identification networking alarm method using the whole nation based on cloud lock as described in claim 1-7 any one
System, it is characterised in that:
Demographic data library is ordered to arrest including cloud lock and the whole nation;
The cloud lock includes identification module, judgment module, background module, communication module, comparison module, alarm module and police
Accuse module;
The identification module, for carrying out identification verifying to user;
The judgment module, for judging that the identity of active user is normal users either illegal user;
The background module, for saving the identity characteristic data of illegal user;
The communication module is ordered to arrest demographic data library with the whole nation for cloud lock and is communicatively coupled;
The comparison module, it is special for the identity characteristic data of the illegal user and the whole nation to be ordered to arrest the identity in demographic data library
Sign data compare;
The alarm module, the identity characteristic data for the illegal user can be fit to the whole nation and order to arrest in demographic data library
When identity characteristic data, alarm operation is made;
The alert module, the identity characteristic data for the illegal user can be fit to the whole nation and order to arrest in demographic data library
When identity characteristic data, warning operation is made.
9. personal identification internet alarm system is ordered to arrest in a kind of whole nation based on cloud lock according to claim 8, feature exists
In:
It further include intelligent terminal and public security organ's server;
Cloud lock further includes sending module;
The sending module is used to send the human face photo of alarm command and the illegal user to intelligent terminal, passes through intelligent terminal
Alarmed and notified user;
Alternatively, cloud lock is connected to public security organ's server by communication network and alarms.
10. personal identification internet alarm system is ordered to arrest in a kind of whole nation based on cloud lock according to claim 8, feature exists
In:
The cloud lock further includes countdown module and infrared sensor module;
The countdown module is used for countdown;
The infrared sensor module is for incuding user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810885413.0A CN109242741A (en) | 2018-08-06 | 2018-08-06 | A kind of whole nation wanted circular personal identification networking alarm method and system based on cloud lock |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810885413.0A CN109242741A (en) | 2018-08-06 | 2018-08-06 | A kind of whole nation wanted circular personal identification networking alarm method and system based on cloud lock |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109242741A true CN109242741A (en) | 2019-01-18 |
Family
ID=65069856
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810885413.0A Pending CN109242741A (en) | 2018-08-06 | 2018-08-06 | A kind of whole nation wanted circular personal identification networking alarm method and system based on cloud lock |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109242741A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110136311A (en) * | 2019-05-21 | 2019-08-16 | 渭南师范学院 | A kind of face identification monitoring device |
CN112184965A (en) * | 2020-09-30 | 2021-01-05 | 宁波久婵物联科技有限公司 | Anti-trailing management method and system based on face lock |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104657817A (en) * | 2015-01-28 | 2015-05-27 | 四川君逸易视科技有限公司 | Face snapshotting, comparing, identifying, retrieving, and inquiring method for bank counter |
CN107301700A (en) * | 2017-06-16 | 2017-10-27 | 成都智慧家信息技术有限公司 | The gate control system of Intelligent Recognition alarm can be carried out |
CN107665530A (en) * | 2017-09-26 | 2018-02-06 | 四川仪岛科技有限公司 | A kind of face identification unit gate control system and control method |
CN207184706U (en) * | 2017-08-29 | 2018-04-03 | 深圳市智能城市技术有限公司 | A kind of recognition of face network monitoring camera head device based on cloud platform |
CN108345868A (en) * | 2018-03-09 | 2018-07-31 | 广东万峯信息科技有限公司 | Public transport based on face recognition technology is pursued and captured an escaped prisoner system and its control method |
-
2018
- 2018-08-06 CN CN201810885413.0A patent/CN109242741A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104657817A (en) * | 2015-01-28 | 2015-05-27 | 四川君逸易视科技有限公司 | Face snapshotting, comparing, identifying, retrieving, and inquiring method for bank counter |
CN107301700A (en) * | 2017-06-16 | 2017-10-27 | 成都智慧家信息技术有限公司 | The gate control system of Intelligent Recognition alarm can be carried out |
CN207184706U (en) * | 2017-08-29 | 2018-04-03 | 深圳市智能城市技术有限公司 | A kind of recognition of face network monitoring camera head device based on cloud platform |
CN107665530A (en) * | 2017-09-26 | 2018-02-06 | 四川仪岛科技有限公司 | A kind of face identification unit gate control system and control method |
CN108345868A (en) * | 2018-03-09 | 2018-07-31 | 广东万峯信息科技有限公司 | Public transport based on face recognition technology is pursued and captured an escaped prisoner system and its control method |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110136311A (en) * | 2019-05-21 | 2019-08-16 | 渭南师范学院 | A kind of face identification monitoring device |
CN112184965A (en) * | 2020-09-30 | 2021-01-05 | 宁波久婵物联科技有限公司 | Anti-trailing management method and system based on face lock |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108198292B (en) | Household monitoring method and system based on intelligent cloud lock | |
US10235822B2 (en) | Automatic system access using facial recognition | |
CN107093244A (en) | Abnormal unlocking control method based on door lock | |
CN106504374A (en) | A kind of can automatic identification entrance guard security system | |
CN106897959A (en) | A kind of intelligent Community safety-protection system based on Internet of Things | |
CN205080681U (en) | Register one's residence door electronic monitoring device | |
CN212276476U (en) | Intelligent door lock | |
CN110580762A (en) | Intelligent household access control system and method | |
CN111691764A (en) | Household intelligent door lock and control method thereof | |
CN109242741A (en) | A kind of whole nation wanted circular personal identification networking alarm method and system based on cloud lock | |
CN108221270B (en) | Shared washing machine control method, device and system based on embedded computer | |
CN203084795U (en) | Bank anti-following linkage door with plurality of identity verifying ways | |
CN207686440U (en) | A kind of networking intelligent electronic lock | |
CN108550209A (en) | A kind of automatic door opening method and system based on infrared inductor and face lock | |
CN108573554A (en) | A kind of automatic identification alarm method and system based on face lock | |
CN104835222A (en) | Entrance guard control method based on voice recognition, facial recognition and fingerprint recognition | |
CN109785487A (en) | A kind of unit building entrance guard security system based on Computer Control Technology | |
CN209912036U (en) | Face identification security entrance guard all-in-one | |
CN209312110U (en) | A kind of intelligent door lock system based on technology of Internet of things | |
CN107610289A (en) | A kind of cell access control system based on electronic information technology | |
CN114049718A (en) | Access control system based on face recognition | |
CN105469472B (en) | intelligent access control method and system | |
CN109272693A (en) | A kind of smart home anti-theft alarm system | |
CN207397360U (en) | A kind of access control system for realizing people stream counting control | |
CN205582175U (en) | Intelligent monitoring anti -theft system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190118 |
|
RJ01 | Rejection of invention patent application after publication |