CN109242741A - A kind of whole nation wanted circular personal identification networking alarm method and system based on cloud lock - Google Patents

A kind of whole nation wanted circular personal identification networking alarm method and system based on cloud lock Download PDF

Info

Publication number
CN109242741A
CN109242741A CN201810885413.0A CN201810885413A CN109242741A CN 109242741 A CN109242741 A CN 109242741A CN 201810885413 A CN201810885413 A CN 201810885413A CN 109242741 A CN109242741 A CN 109242741A
Authority
CN
China
Prior art keywords
cloud lock
user
whole nation
module
arrest
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810885413.0A
Other languages
Chinese (zh)
Inventor
马裕文
萧智丹
李志勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Hutlon Technology Co Ltd
Foshan Hutlon Intelligent Technology Co Ltd
Original Assignee
Guangdong Hutlon Technology Co Ltd
Foshan Hutlon Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Hutlon Technology Co Ltd, Foshan Hutlon Intelligent Technology Co Ltd filed Critical Guangdong Hutlon Technology Co Ltd
Priority to CN201810885413.0A priority Critical patent/CN109242741A/en
Publication of CN109242741A publication Critical patent/CN109242741A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Biomedical Technology (AREA)
  • Educational Administration (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Medical Informatics (AREA)
  • Alarm Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Lock And Its Accessories (AREA)

Abstract

A kind of whole nation wanted circular personal identification networking alarm method based on cloud lock, include the following steps: step A: cloud lock carries out identification verifying to user;Step B: judging whether the user is illegal user, if the user is not illegal user, cloud locks normal release;If the user is illegal user, C is entered step;Step C: the backstage of cloud lock saves the identity characteristic data of the illegal user, and cloud lock is ordered to arrest demographic data library with the whole nation by communication network and connect, and the identity characteristic data of the illegal user are ordered to arrest the identity characteristic data in demographic data library with the whole nation and are compared;Step D: if the identity characteristic data in the illegal user in step C can be fit to the identity characteristic data in the wanted circular demographic data library of the whole nation; cloud lock then makes alarm or warning operation; it can be improved the reliability and safety of cloud lock; more fully the protection user person and property safety, but also arrest criminal for Ministry of Public Security law enfrocement official and very very accurately assistance in time is provided.

Description

A kind of whole nation wanted circular personal identification networking alarm method and system based on cloud lock
Technical field
The present invention relates to cloud lock technology fields more particularly to a kind of whole nation based on cloud lock to order to arrest personal identification network alarm Method and system.
Background technique
Although what the intelligent cloud at present with recognition of face was locked, which popularizes, has brought very big convenience, social condition is multiple It is miscellaneous, have the convenience that the undesirable people of the vertical heart is not necessarily to key using intelligent cloud lock, it is intended to crack intelligent cloud from outside and be locked into within doors Illegal business is carried out, is threatened to user.
Summary of the invention
It is an object of the invention to propose that personal identification networking alarm method and system are ordered to arrest in a kind of whole nation based on cloud lock, The reliability and safety of raising cloud lock, more fully the protection user person and property safety, but also be Ministry of Public Security law enforcement people Member arrests criminal and provides very very accurately assistance in time, kills two birds with one stone.
To achieve this purpose, the present invention adopts the following technical scheme:
A kind of whole nation wanted circular personal identification networking alarm method based on cloud lock, includes the following steps:
Step A: cloud lock carries out identification verifying to user;
Step B: judging whether the user is illegal user, if the user is not illegal user, cloud locks normal release;If The user is illegal user, then enters step C;
Step C: the backstage of cloud lock saves the identity characteristic data of the illegal user, and cloud lock is logical by communication network and the whole nation The connection of demographic data library is seized, and the identity characteristic data of the illegal user and the whole nation are ordered to arrest to the identity characteristic in demographic data library Data compare;
Step D: if the identity characteristic data of the illegal user in step C can be fit to the whole nation and order to arrest demographic data Identity characteristic data in library, cloud lock then make alarm or warning operation.
Further,
In step D, cloud lock then makes the detailed process of alarm are as follows:
The human face photo that cloud lock sends alarm command and the illegal user is alarmed to intelligent terminal by intelligent terminal With notify user.
Further,
In step D, cloud lock then makes the detailed process of alarm are as follows:
Cloud lock is connected to public security organ's server by communication network and alarms.
Further,
In step D, cloud lock makes the detailed process of warning are as follows:
Cloud lock makes warning by acousto-optic hint.
Further,
In step D, if the identity characteristic data of the illegal user in step C can not be fit to the whole nation and order to arrest people Identity characteristic data in member's database, human face photo to the intelligent terminal that cloud lock sends the illegal user notify user.
Further,
In step D, after the human face photo that cloud lock sends the illegal user notifies user to intelligent terminal, user passes through Intelligent terminal is communicatively coupled with cloud lock, and is sent unlocking instruction to cloud and locked, and unlocking operation is carried out.
Further,
In stepb, if the user is not illegal user, cloud locks normal release, specific unlocking process are as follows:
Countdown module in cloud lock carries out countdown, and the countdown module is after countdown to preset time, cloud The infrared induction mold of lock still senses there is user in front of the door, then the cloud lock unlock, door are opened.
The system for ordering to arrest personal identification networking alarm method using the whole nation based on cloud lock,
Demographic data library is ordered to arrest including cloud lock and the whole nation;
The cloud lock includes identification module, judgment module, background module, communication module, comparison module, alarm module And alert module;
The identification module, for carrying out identification verifying to user;
The judgment module, for judging that the identity of active user is normal users either illegal user;
The background module, for saving the identity characteristic data of illegal user;
The communication module is ordered to arrest demographic data library with the whole nation for cloud lock and is communicatively coupled;
The comparison module, for the identity characteristic data of the illegal user and the whole nation to be ordered to arrest to the body in demographic data library Part characteristic compares;
The alarm module, the identity characteristic data for the illegal user can be fit to the whole nation and order to arrest demographic data library In identity characteristic data when, make alarm operation;
The alert module, the identity characteristic data for the illegal user can be fit to the whole nation and order to arrest demographic data library In identity characteristic data when, make warning operation.
Further,
It further include intelligent terminal and public security organ's server;
Cloud lock further includes sending module;
The sending module is used to send the human face photo of alarm command and the illegal user to intelligent terminal, passes through intelligence User is alarmed and notified to terminal;
Alternatively, cloud lock is connected to public security organ's server by communication network and alarms.
Further,
The cloud lock further includes countdown module and infrared sensor module;
The countdown module is used for countdown;
The infrared sensor module is for incuding user.
The present invention proposes that a kind of whole nation based on cloud lock is ordered to arrest according to above content System improves the reliability and safety of cloud lock, more fully the protection user person and property safety, but also enforces the law for the Ministry of Public Security Personnel arrest criminal and provide very very accurately assistance in time, kill two birds with one stone.
Detailed description of the invention
Fig. 1 is the flow chart of the one of embodiment of the present invention;
Fig. 2 is the system diagram of the one of embodiment of the present invention.
Wherein: cloud locks 1, identification module 11, judgment module 12, background module 13, communication module 14, comparison module 15, alarm module 16, alert module 17, sending module 18, sound flash alarm system module 19, countdown module 19, infrared sensor module 101, demographic data library 2, intelligent terminal 3, public security organ's server 4 are ordered to arrest in the whole nation.
Specific embodiment
To further illustrate the technical scheme of the present invention below with reference to the accompanying drawings and specific embodiments.
A kind of whole nation wanted circular personal identification networking alarm method based on cloud lock, includes the following steps:
Step A: cloud locks 1 couple of user and carries out identification verifying;
Step B: judging whether the user is illegal user, if the user is not illegal user, cloud locks 1 normal release; If the user is illegal user, C is entered step;
Step C: the backstage of cloud lock 1 saves the identity characteristic data of the illegal user, and cloud lock 1 passes through communication network and the whole nation It orders to arrest demographic data library 2 to connect, and the identity characteristic data of the illegal user and the whole nation is ordered to arrest to the identity in demographic data library 2 Characteristic compares;
Step D: if the identity characteristic data of the illegal user in step C can be fit to the whole nation and order to arrest demographic data Identity characteristic data in library 2, cloud lock 1 then make alarm or warning operation.
Cloud locks 1 couple of user and carries out identification verifying, and the mode of verifying can be tested for recognition of face verifying, fingerprint recognition Card, key feeding cipher verifying etc., and the present embodiment cloud lock 1 uses recognition of face to verify, the identity characteristic data verified It is shape of face characteristic.
If normal user, then 1 verifying can be locked by cloud, cloud lock 1 can normal release;If illegal user, cloud lock 1 There is no the shape of face characteristic of these illegal users is stored in advance, if there is illegal user to attempt to unlock, at this moment, after cloud lock 1 Platform saves the shape of face characteristic of the illegal user, and cloud lock 1 is ordered to arrest demographic data library 2 with the whole nation by communication network and connect, and The shape of face characteristic of the illegal user is ordered to arrest the shape of face characteristic in demographic data library 2 with the whole nation to compare, if should The shape of face characteristic of illegal user can be fit to the shape of face characteristic in the wanted circular demographic data library 2 of the whole nation, and cloud lock 1 is then made Operation is alarmed or alerted out, the reliability and safety of cloud lock 1, more fully the protection user person and property safety are improved, and And also arrest criminal for Ministry of Public Security law enfrocement official and very very accurately assistance in time is provided, it kills two birds with one stone.
Further,
In step D, cloud lock 1 then makes the detailed process of alarm are as follows:
The human face photo that cloud lock 1 sends alarm command and the illegal user is carried out to intelligent terminal 3 by intelligent terminal 3 Alarm and notify user.
On the one hand it can efficiently and rapidly alarm, user on the other hand can be allowed to be clear from the face appearance of illegal user, Improve the vigilance of user.When there is illegal user to attempt to be unlocked cloud lock 1, cloud lock 1 can capture the people of the illegal user Face photo.
Further,
In step D, cloud lock 1 then makes the detailed process of alarm are as follows:
Cloud lock 1 is connected to public security organ's server 4 by communication network and alarms.
Realization is more quickly and efficiently alarmed, and protects the person and property safety of user at the first time.
Further,
In step D, cloud lock 1 makes the detailed process of warning are as follows:
Cloud lock 1 makes warning by acousto-optic hint.
Play the role of alerting the illegal user.
Further,
In step D, if the identity characteristic data of the illegal user in step C can not be fit to the whole nation and order to arrest people Identity characteristic data in member's database 2, human face photo to the intelligent terminal 3 that cloud lock 1 sends the illegal user notify user.
If the identity characteristic data of the illegal user in step C can not be fit to the whole nation and order to arrest demographic data library 2 In identity characteristic data, then the illegal user is likely to be visitor, can inform the identity information of owner visitor in time, main People, which understands, has visitor to arrive, and can securely open the door, and relievedly receives visitor.
Further,
In step D, after the human face photo that cloud lock 1 sends the illegal user notifies user to intelligent terminal 3, Yong Hutong It crosses intelligent terminal 3 to be communicatively coupled with cloud lock 1, and sends unlocking instruction to cloud lock 1, carry out unlocking operation.
After user has checked the human face photo of the illegal user, if the illegal user is the friend being very familiar with, and householder Temporarily stay out again in, user is communicatively coupled by intelligent terminal 3 and cloud lock 1 at this time, and is sent unlocking instruction to cloud and locked 1, unlocking operation is carried out, visitor is allowed first to enter house rest, visitor's long-time is avoided to wait outdoors.
In another example householder is just busy at home, inconvenient to open the door at door, user passes through intelligent terminal 3 and cloud at this time for this Lock 1 is communicatively coupled, and sends unlocking instruction to cloud lock 1, carries out unlocking operation, progress unlocking operation is convenient and efficient.
Further,
In stepb, if the user is not illegal user, cloud locks 1 normal release, specific unlocking process are as follows:
Countdown module in cloud lock 1 carries out countdown, and the countdown module is after countdown to preset time, cloud The infrared induction mold of lock 1 still senses there is user in front of the door, then 1 unlock of cloud lock, door are opened.
The preset countdown of countdown module described in the present embodiment be the time be 2 seconds, it is assumed that the countdown module is fallen After having counted 2 seconds, user still in front of the door, then proves there is enabling sign, at this point, the infrared induction mold still senses user Have visitor, then cloud lock 1 can just unlock, and Men Caihui is opened, in this case, can accomplish to accurately identify enabling sign and from It is dynamic to open the door, the intelligence of cloud lock 1 is promoted, makes user more convenient to use.
The system for ordering to arrest personal identification networking alarm method using the whole nation based on cloud lock, including cloud lock 1 and complete State orders to arrest demographic data library 2;
The cloud lock 1 includes identification module 11, judgment module 12, background module 13, communication module 14, comparison module 15, alarm module 16 and alert module 17;
The identification module 11, for carrying out identification verifying to user;
The judgment module 12, for judging that the identity of active user is normal users either illegal user;
The background module 13, for saving the identity characteristic data of illegal user;
The communication module 14 is ordered to arrest demographic data library 2 with the whole nation for cloud lock 1 and is communicatively coupled;
The comparison module 15, for ordering to arrest the identity characteristic data of the illegal user and the whole nation in demographic data library 2 Identity characteristic data compare;
The alarm module 16, the identity characteristic data for the illegal user can be fit to the whole nation and order to arrest demographic data When identity characteristic data in library 2, alarm operation is made;
The alert module 17, the identity characteristic data for the illegal user can be fit to the whole nation and order to arrest demographic data When identity characteristic data in library 2, warning operation is made.
System by ordering to arrest personal identification networking alarm method based on the whole nation that cloud is locked, more fully the protection user person And property safety, but also arrest criminal for Ministry of Public Security law enfrocement official and very very accurately assistance in time is provided, it kills two birds with one stone.
Further,
It further include intelligent terminal 3 and public security organ's server 4;
Cloud lock 1 further includes sending module 18;
The sending module 18 is used to send the human face photo of alarm command and the illegal user to intelligent terminal 3, passes through User is alarmed and notified to intelligent terminal 3;
Alternatively, cloud lock 1 is connected to public security organ's server 4 by communication network and alarms.
On the one hand it can efficiently and rapidly alarm, user on the other hand can be allowed to be clear from the face appearance of illegal user, Improve the vigilance of user.When there is illegal user to attempt to be unlocked cloud lock 1, cloud lock 1 can capture the people of the illegal user Face photo protects the person and property safety of user at the first time.
Further,
The cloud lock 1 further includes countdown module 19 and infrared sensor module 101;
The countdown module 19 is used for countdown;
The infrared sensor module 101 is for incuding user.
The preset countdown of countdown module described in the present embodiment be the time be 2 seconds, it is assumed that the countdown module is fallen After having counted 2 seconds, user still in front of the door, then proves there is enabling sign, at this point, the infrared induction mold still senses user Have visitor, then cloud lock 1 can just unlock, and Men Caihui is opened, in this case, can accomplish to accurately identify enabling sign and from It is dynamic to open the door, the intelligence of cloud lock 1 is promoted, makes user more convenient to use.
The technical principle of the invention is described above in combination with a specific embodiment.These descriptions are intended merely to explain of the invention Principle, and shall not be construed in any way as a limitation of the scope of protection of the invention.Based on the explanation herein, the technology of this field Personnel can associate with other specific embodiments of the invention without creative labor, these modes are fallen within Within protection scope of the present invention.

Claims (10)

1. personal identification networking alarm method is ordered to arrest in a kind of whole nation based on cloud lock, characterized by the following steps:
Step A: cloud lock carries out identification verifying to user;
Step B: judging whether the user is illegal user, if the user is not illegal user, cloud locks normal release;If the use Family is illegal user, then enters step C;
Step C: the backstage of cloud lock saves the identity characteristic data of the illegal user, and cloud lock orders to arrest people by communication network and the whole nation Member's database connects, and the identity characteristic data of the illegal user and the whole nation are ordered to arrest to the identity characteristic data in demographic data library It compares;
Step D: if the identity characteristic data in the illegal user in step C can be fit in the wanted circular demographic data library of the whole nation Identity characteristic data, cloud lock then makes alarm or warning operation.
2. personal identification networking alarm method is ordered to arrest in a kind of whole nation based on cloud lock according to claim 1, feature exists In:
In step D, cloud lock then makes the detailed process of alarm are as follows:
The human face photo that cloud lock sends alarm command and the illegal user is alarmed and is led to by intelligent terminal to intelligent terminal Know user.
3. personal identification networking alarm method is ordered to arrest in a kind of whole nation based on cloud lock according to claim 1, feature exists In:
In step D, cloud lock then makes the detailed process of alarm are as follows:
Cloud lock is connected to public security organ's server by communication network and alarms.
4. personal identification networking alarm method is ordered to arrest in a kind of whole nation based on cloud lock according to claim 1, feature exists In:
In step D, cloud lock makes the detailed process of warning are as follows:
Cloud lock makes warning by acousto-optic hint.
5. personal identification networking alarm method is ordered to arrest in a kind of whole nation based on cloud lock according to claim 1, feature exists In:
In step D, if the identity characteristic data of the illegal user in step C can not be fit to national wanted circular personnel number According to the identity characteristic data in library, human face photo to the intelligent terminal that cloud lock sends the illegal user notifies user.
6. personal identification networking alarm method is ordered to arrest in a kind of whole nation based on cloud lock according to claim 1, feature exists In:
In step D, after the human face photo that cloud lock sends the illegal user notifies user to intelligent terminal, user passes through intelligence Terminal is communicatively coupled with cloud lock, and is sent unlocking instruction to cloud and locked, and unlocking operation is carried out.
7. personal identification networking alarm method is ordered to arrest in a kind of whole nation based on cloud lock according to claim 1, feature exists In:
In stepb, if the user is not illegal user, cloud locks normal release, specific unlocking process are as follows:
Cloud lock in countdown module carry out countdown, the countdown module after countdown to preset time, cloud lock Infrared induction mold still senses user in front of the door, then the cloud lock unlock, door are opened.
8. ordering to arrest personal identification networking alarm method using the whole nation based on cloud lock as described in claim 1-7 any one System, it is characterised in that:
Demographic data library is ordered to arrest including cloud lock and the whole nation;
The cloud lock includes identification module, judgment module, background module, communication module, comparison module, alarm module and police Accuse module;
The identification module, for carrying out identification verifying to user;
The judgment module, for judging that the identity of active user is normal users either illegal user;
The background module, for saving the identity characteristic data of illegal user;
The communication module is ordered to arrest demographic data library with the whole nation for cloud lock and is communicatively coupled;
The comparison module, it is special for the identity characteristic data of the illegal user and the whole nation to be ordered to arrest the identity in demographic data library Sign data compare;
The alarm module, the identity characteristic data for the illegal user can be fit to the whole nation and order to arrest in demographic data library When identity characteristic data, alarm operation is made;
The alert module, the identity characteristic data for the illegal user can be fit to the whole nation and order to arrest in demographic data library When identity characteristic data, warning operation is made.
9. personal identification internet alarm system is ordered to arrest in a kind of whole nation based on cloud lock according to claim 8, feature exists In:
It further include intelligent terminal and public security organ's server;
Cloud lock further includes sending module;
The sending module is used to send the human face photo of alarm command and the illegal user to intelligent terminal, passes through intelligent terminal Alarmed and notified user;
Alternatively, cloud lock is connected to public security organ's server by communication network and alarms.
10. personal identification internet alarm system is ordered to arrest in a kind of whole nation based on cloud lock according to claim 8, feature exists In:
The cloud lock further includes countdown module and infrared sensor module;
The countdown module is used for countdown;
The infrared sensor module is for incuding user.
CN201810885413.0A 2018-08-06 2018-08-06 A kind of whole nation wanted circular personal identification networking alarm method and system based on cloud lock Pending CN109242741A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810885413.0A CN109242741A (en) 2018-08-06 2018-08-06 A kind of whole nation wanted circular personal identification networking alarm method and system based on cloud lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810885413.0A CN109242741A (en) 2018-08-06 2018-08-06 A kind of whole nation wanted circular personal identification networking alarm method and system based on cloud lock

Publications (1)

Publication Number Publication Date
CN109242741A true CN109242741A (en) 2019-01-18

Family

ID=65069856

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810885413.0A Pending CN109242741A (en) 2018-08-06 2018-08-06 A kind of whole nation wanted circular personal identification networking alarm method and system based on cloud lock

Country Status (1)

Country Link
CN (1) CN109242741A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110136311A (en) * 2019-05-21 2019-08-16 渭南师范学院 A kind of face identification monitoring device
CN112184965A (en) * 2020-09-30 2021-01-05 宁波久婵物联科技有限公司 Anti-trailing management method and system based on face lock

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104657817A (en) * 2015-01-28 2015-05-27 四川君逸易视科技有限公司 Face snapshotting, comparing, identifying, retrieving, and inquiring method for bank counter
CN107301700A (en) * 2017-06-16 2017-10-27 成都智慧家信息技术有限公司 The gate control system of Intelligent Recognition alarm can be carried out
CN107665530A (en) * 2017-09-26 2018-02-06 四川仪岛科技有限公司 A kind of face identification unit gate control system and control method
CN207184706U (en) * 2017-08-29 2018-04-03 深圳市智能城市技术有限公司 A kind of recognition of face network monitoring camera head device based on cloud platform
CN108345868A (en) * 2018-03-09 2018-07-31 广东万峯信息科技有限公司 Public transport based on face recognition technology is pursued and captured an escaped prisoner system and its control method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104657817A (en) * 2015-01-28 2015-05-27 四川君逸易视科技有限公司 Face snapshotting, comparing, identifying, retrieving, and inquiring method for bank counter
CN107301700A (en) * 2017-06-16 2017-10-27 成都智慧家信息技术有限公司 The gate control system of Intelligent Recognition alarm can be carried out
CN207184706U (en) * 2017-08-29 2018-04-03 深圳市智能城市技术有限公司 A kind of recognition of face network monitoring camera head device based on cloud platform
CN107665530A (en) * 2017-09-26 2018-02-06 四川仪岛科技有限公司 A kind of face identification unit gate control system and control method
CN108345868A (en) * 2018-03-09 2018-07-31 广东万峯信息科技有限公司 Public transport based on face recognition technology is pursued and captured an escaped prisoner system and its control method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110136311A (en) * 2019-05-21 2019-08-16 渭南师范学院 A kind of face identification monitoring device
CN112184965A (en) * 2020-09-30 2021-01-05 宁波久婵物联科技有限公司 Anti-trailing management method and system based on face lock

Similar Documents

Publication Publication Date Title
CN108198292B (en) Household monitoring method and system based on intelligent cloud lock
US10235822B2 (en) Automatic system access using facial recognition
CN107093244A (en) Abnormal unlocking control method based on door lock
CN106504374A (en) A kind of can automatic identification entrance guard security system
CN106897959A (en) A kind of intelligent Community safety-protection system based on Internet of Things
CN205080681U (en) Register one's residence door electronic monitoring device
CN212276476U (en) Intelligent door lock
CN110580762A (en) Intelligent household access control system and method
CN111691764A (en) Household intelligent door lock and control method thereof
CN109242741A (en) A kind of whole nation wanted circular personal identification networking alarm method and system based on cloud lock
CN108221270B (en) Shared washing machine control method, device and system based on embedded computer
CN203084795U (en) Bank anti-following linkage door with plurality of identity verifying ways
CN207686440U (en) A kind of networking intelligent electronic lock
CN108550209A (en) A kind of automatic door opening method and system based on infrared inductor and face lock
CN108573554A (en) A kind of automatic identification alarm method and system based on face lock
CN104835222A (en) Entrance guard control method based on voice recognition, facial recognition and fingerprint recognition
CN109785487A (en) A kind of unit building entrance guard security system based on Computer Control Technology
CN209912036U (en) Face identification security entrance guard all-in-one
CN209312110U (en) A kind of intelligent door lock system based on technology of Internet of things
CN107610289A (en) A kind of cell access control system based on electronic information technology
CN114049718A (en) Access control system based on face recognition
CN105469472B (en) intelligent access control method and system
CN109272693A (en) A kind of smart home anti-theft alarm system
CN207397360U (en) A kind of access control system for realizing people stream counting control
CN205582175U (en) Intelligent monitoring anti -theft system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190118

RJ01 Rejection of invention patent application after publication