CN109544748A - Access control management method and access control terminal, system - Google Patents
Access control management method and access control terminal, system Download PDFInfo
- Publication number
- CN109544748A CN109544748A CN201811395117.9A CN201811395117A CN109544748A CN 109544748 A CN109544748 A CN 109544748A CN 201811395117 A CN201811395117 A CN 201811395117A CN 109544748 A CN109544748 A CN 109544748A
- Authority
- CN
- China
- Prior art keywords
- user
- target
- access control
- instruction
- entrance guard
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
Abstract
This application discloses a kind of access control management method and access control terminals, system.Wherein, this method comprises: the access control terminal obtains target facial image;Wherein, the target facial image is the facial image of target user, and the target user is the user to be determined for whether allowing access into target area;The access control terminal verifies the target facial image, obtains verification result;The attribute of the target user is obtained according to the verification result, control instruction is obtained according to the attribute of the target user, wherein, the control instruction includes the first control instruction, and first control instruction is for being sent to the entrance guard device to control the entrance guard device.Using the application, the efficiency that user passes in and out target area can be effectively improved.
Description
Technical field
This application involves internet of things field more particularly to a kind of access control management method and access control terminals, system.
Background technique
Currently, most of residential area or unit building require to be managed the personnel in the personnel of disengaging.One
As for, the administrative staff of residential area or unit building can be provided integrated circuit to cell personnel (integrated circuit,
IC) block, so that cell can be passed in and out by brush IC card when cell personnel pass in and out cell.Alternatively, doorway machine can also be passed through
The form of gate inhibition, when so that cell personnel passing in and out cell, as long as correctly entering gate inhibition's password, so that it may freely enter and leave cell.
However, user can be made to pass in and out the inefficiency of cell using aforesaid way.
Summary of the invention
This application provides a kind of access control management method and access control terminals, system, can effectively improve user and pass in and out mesh
The efficiency for marking region, facilitates user to the greatest extent.
In a first aspect, the embodiment of the present application provides a kind of access control management method, the method is applied to entrance guard management system
System, the access control system includes access control terminal and entrance guard device, which comprises
The access control terminal obtains target facial image;Wherein, the target facial image is the people of target user
Face image, the target user are the user to be determined for whether allowing access into target area;
The access control terminal verifies the target facial image, obtains verification result;
The attribute that the target user is obtained according to the verification result is obtained according to the attribute of the target user and is controlled
Instruction, wherein the control instruction includes the first control instruction, and first control instruction is for being sent to the entrance guard device
To control the entrance guard device.
Implement the embodiment of the present application, target area is entered by brush face, efficiently solves since user carries IC card not side
Just the case where or user inputs password and forgets Password, so that not only facilitating user enters target area, but also can mention
High user experience, increases user satisfaction.
As a kind of possible implementation, the attribute that the target user is obtained according to the verification result, root
According to the target user attribute obtain the first control instruction, and by first control instruction be sent to the entrance guard device with
Control the entrance guard device, comprising:
It is to determine that the target user is white list user in the case where being proved to be successful in response to the verification result,
In, the white list user includes: the permanent resident population of the target area;
In response to the target user be the target area permanent resident population the case where, obtain it is described first control refers to
It enables, and first control instruction is sent to the entrance guard device to control the entrance guard device and open.
It is described that first control instruction is sent to the entrance guard device to control as a kind of possible implementation
After the entrance guard device is opened, the method also includes:
The access control terminal determines the smart home device that the target user uses;
The access control terminal sends open command to the smart home device;Wherein, the open command is used for
The smart home device is opened in instruction.
As a kind of possible implementation, in the case where the verification result is to be proved to be successful, the method is also wrapped
It includes:
The access control terminal generates the current record of the target user, wherein the current record includes passing through
Time, current at least one of address and the target facial image;
The current record is uploaded to Cloud Server by the access control terminal.
As a kind of possible implementation, the attribute that the target user is obtained according to the verification result, root
According to the target user attribute obtain the first control instruction, and by first control instruction be sent to the entrance guard device with
Control the entrance guard device, comprising:
In the case where being authentication failed in response to the verification result, judge whether the target user is that blacklist is used
Family;
In the case where being judged as NO, first control instruction is obtained according to the feedback information of the first user terminal, and
First control instruction is sent to the entrance guard device to control the entrance guard device.
As a kind of possible implementation, the control instruction further includes the first prompt information, the method also includes:
In the case where being judged as YES, the access control terminal sends first prompt information to second user end
End.
It is described that first control is obtained according to the feedback information of the first user terminal as a kind of possible implementation
Instruction, and first control instruction is sent to the entrance guard device to control the entrance guard device, comprising:
The request for confirming the identity of the target user is sent to first user terminal;
In the case where identity instruction in response to receiving the confirmation target user from first user terminal,
First control instruction is obtained, and first control instruction is sent to the entrance guard device to control the entrance guard device
It opens;
The case where identity in response to not receiving the confirmation target user from first user terminal instructs
Under, it sends and confirms the request of target user's identity to the second user terminal.
As a kind of possible implementation, the request for sending the identity for confirming the target user to described second
After user terminal, the method also includes:
In the case where identity instruction in response to receiving the confirmation target user from the second user terminal,
The second control instruction is obtained, and second control instruction is sent to the entrance guard device and is opened with controlling the entrance guard device
It opens;
The case where identity in response to not receiving the confirmation target user from the second user terminal instructs
Under, the second prompt information is sent to user's second user terminal.
As a kind of possible implementation, in the case where the verification result is to be proved to be successful, alternatively, receiving
In the case where confirming target user's identity instruction, the method also includes:
Determine the current channel unit of the target user;
Third control instruction is sent to the channel unit;Wherein, the channel unit includes access control equipment and elevator
At least one of equipment, the third control instruction is for controlling in the access control equipment and the lift facility
At least one.
As a kind of possible implementation, the method also includes:
The target facial image of the target user is uploaded to the Cloud Server by the access control terminal.
As a kind of possible implementation, after the access control terminal obtains target facial image, the method
Further include:
In the display screen displaying target information of the access control terminal, wherein the target information includes targeted advertisements.
Second aspect, the embodiment of the present application also provides a kind of access control systems, comprising: access control terminal and gate inhibition
Device, wherein
The access control terminal verifies the target facial image for obtaining target facial image, obtains
Verification result, and the attribute of the target user is obtained according to the verification result, it is obtained according to the attribute of the target user
Take control instruction, wherein the control instruction includes the first control instruction, and first control instruction is for being sent to the door
Prohibit device to control the entrance guard device;Wherein, the target facial image is the facial image of target user, and the target is used
Family is the user to be determined for whether allowing access into target area;
The entrance guard device for receiving the first control instruction from the access control terminal, and controls the door
Prohibit device.
As a kind of possible implementation, the access control terminal, specifically for being in response to the verification result
In the case where being proved to be successful, determine that the target user is white list user, wherein the white list user includes: the mesh
Mark the permanent resident population in region;And in response to the target user be the target area permanent resident population the case where, obtain institute
The first control instruction is stated, and first control instruction is sent to the entrance guard device to control the entrance guard device and open;
The entrance guard device specifically for receiving first control instruction from the access control terminal, and is controlled
The entrance guard device is made to open.
As a kind of possible implementation, the access control system further includes Cloud Server,
The access control terminal is also used to generate the current record of the target user, and will be on the current record
Reach Cloud Server;Wherein, the current record include in transit time, current address and the target facial image extremely
Few one kind;
The Cloud Server for receiving the current record from the access control terminal, and saves described logical
Row record.
As a kind of possible implementation, the access control system further includes that the first user terminal and second user are whole
End, the control instruction further includes the first prompt information,
The access control terminal is specifically used in the case where being authentication failed in response to the verification result, judges institute
State whether target user is black list user;In the case where being judged as YES, sends the first prompt information and give second user terminal;
In the case where being judged as NO, first control instruction is obtained according to the feedback information of the first user terminal, and by described the
One control instruction is sent to the entrance guard device to control the entrance guard device;
First user terminal, in the case where the access control terminal is judged as NO, Xiang Suoshu gate inhibition to be controlled
Terminal processed sends feedback information;
The second user terminal, for receiving from described in the case where the access control terminal is judged as YES
First prompt information of access control terminal.
In one possible implementation, the access control terminal is specifically used for sending out to first user terminal
Send the request for confirming the identity of the target user;In response to receiving the confirmation target from first user terminal
In the case where the identity instruction of user, first control instruction is obtained, and first control instruction is sent to the door
Prohibit device and is opened with controlling the entrance guard device;In response to not receiving the confirmation target from first user terminal
In the case where the identity instruction of user, sends and confirm the request of target user's identity to the second user terminal;
First user terminal, specifically for receiving the confirmation target user's from the access control terminal
The request of identity, and the identity instruction for confirming the target user is sent to the access control terminal;
The second user terminal is also used to receive the body of the confirmation target user from the access control terminal
The request of part.
As a kind of possible implementation, the access control terminal is also used to come from described the in response to receiving
In the case where the identity instruction of the confirmation target user of two user terminals, the second control instruction is obtained, and by described second
Control instruction is sent to the entrance guard device to control the entrance guard device and open;It is used in response to not receiving from described second
In the case where the identity instruction of the confirmation target user of family terminal, the second prompt information is sent to user's second user
Terminal;
The second user terminal, the identity for being also used to send the confirmation target user to the access control terminal refer to
It enables, alternatively, receiving the second prompt information from the access control terminal.
As a kind of possible implementation, in the case where the verification result is to be proved to be successful, alternatively, receiving
In the case where confirming target user's identity instruction,
The access control terminal is also used to determine the current channel unit of the target user;And to the channel
Equipment sends third control instruction;Wherein, the channel unit includes at least one of access control equipment and lift facility, institute
State third control instruction for control in the access control equipment and the lift facility at least one of.
As a kind of possible implementation, the access control terminal is also used to the target person of the target user
Face image is uploaded to the Cloud Server;
The Cloud Server is also used to receive the target face figure of the target user from the access control terminal
Picture.
As a kind of possible implementation, the access control terminal is also used in the aobvious of the access control terminal
Display screen displaying target information, wherein the target information includes targeted advertisements.
The third aspect, the embodiment of the present application provide a kind of access control terminal, comprising:
Acquiring unit, for obtaining target facial image;Wherein, the target facial image is the face figure of target user
Picture, the target user are the user to be determined for whether allowing access into target area;
Image authentication unit obtains verification result for verifying to the target facial image;
Instruction process unit, for obtaining the attribute of the target user according to the verification result, and according to described
The attribute of target user obtains control instruction, wherein the control instruction includes the first control instruction, first control instruction
For being sent to the entrance guard device to control the entrance guard device.
As a kind of possible implementation, described instruction processing unit, comprising:
Subelement is determined, for being in the case where being proved to be successful, to determine the target user in response to the verification result
For white list user, wherein the white list user includes: the permanent resident population of the target area;
Instruction processing subelement, in response to the target user be the target area permanent resident population the case where,
First control instruction is obtained, and first control instruction is sent to the entrance guard device to control the entrance guard device
It opens.
As a kind of possible implementation, the access control terminal further include:
Determination unit, the smart home device used for determining the target user;
Transmission unit, for sending open command to the smart home device;Wherein, the open command is used to indicate
Open the smart home device.
As a kind of possible implementation, in the case where the verification result is to be proved to be successful, the access control
Terminal further include:
Generation unit, for generating the current record of the target user, wherein when the current record includes current
Between, current at least one of address and the target facial image;
Uploading unit, for the current record to be uploaded to Cloud Server.
As a kind of possible implementation, described instruction processing unit, comprising:
Judgment sub-unit judges the target user in the case where being authentication failed in response to the verification result
It whether is black list user;
Instruction processing subelement, for being obtained according to the feedback information of the first user terminal in the case where being judged as NO
First control instruction, and first control instruction is sent to the entrance guard device to control the entrance guard device.
As a kind of possible implementation, the control instruction further includes the first prompt information, and described instruction processing is single
Member further include:
Transmission sub-unit, in the case where being judged as YES, the access control terminal send the first prompt information to
Second user terminal.
As a kind of possible implementation, described instruction handles subelement, is specifically used for first user terminal
Send the request for confirming the identity of the target user;
Described instruction handles subelement, is also used in response to receiving the confirmation mesh from first user terminal
In the case where the identity instruction for marking user, first control instruction is obtained, and first control instruction is sent to described
Entrance guard device is opened with controlling the entrance guard device;
Described instruction handles subelement, is also used in response to not receiving described in the confirmation from first user terminal
In the case where the identity instruction of target user, sends and confirm the request of target user's identity to the second user terminal.
As a kind of possible implementation, described instruction handles subelement, is also used in response to receiving from described
In the case where the identity instruction of the confirmation target user of second user terminal, the second control instruction is obtained, and by described the
Two control instructions are sent to the entrance guard device to control the entrance guard device and open;
Described instruction handles subelement, is also used in response to not receiving described in the confirmation from first user terminal
In the case where the identity instruction of target user, the second prompt information is sent to the second user terminal.
As a kind of possible implementation, in the case where the verification result is to be proved to be successful, alternatively, receiving
In the case where confirming target user's identity instruction,
The determination unit is also used to determine the current channel unit of the target user;
Transmission unit is also used to send third control instruction to the channel unit;Wherein, the channel unit includes door
Prohibit at least one of equipment and lift facility, the third control instruction is for controlling the access control equipment and the electricity
At least one of in terraced equipment.
As a kind of possible implementation, the access control terminal further include:
Uploading unit, for the target facial image of the target user to be uploaded to the Cloud Server.
As a kind of possible implementation, the access control terminal further include:
Display unit, for the display screen displaying target information in the access control terminal, wherein the target information
Including targeted advertisements.
Fourth aspect, the embodiment of the present application also provides a kind of access control terminals, comprising: processor and memory, institute
It states processor to connect with the memory, computer-readable instruction, the computer-readable instruction is stored in the memory
When being executed by the processor, the processor is made to execute such as the described in any item methods of first aspect.
As a kind of possible implementation, the access control terminal can also include input/output interface, described defeated
Enter output interface, for supporting the communication between the access control terminal and other equipment.
5th aspect, the embodiment of the present application provide a kind of computer readable storage medium, the computer-readable storage
Program instruction is stored in medium, when run on a computer, so that computer executes method described in the various aspects.
6th aspect, the embodiment of the present application provides a kind of computer program product comprising instruction, when it is in computer
When upper operation, so that computer executes method described in the various aspects.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application or in background technique below will be implemented the application
Attached drawing needed in example or background technique is illustrated.
Fig. 1 is a kind of configuration diagram of access control system provided by the embodiments of the present application;
Fig. 2 is the configuration diagram of another access control system provided by the embodiments of the present application;
Fig. 3 is a kind of flow diagram of access control management method provided by the embodiments of the present application;
Fig. 4 is the flow diagram of another access control management method provided by the embodiments of the present application;
Fig. 5 is the flow diagram provided by the embodiments of the present application for having a kind of access control management method;
Fig. 6 is a kind of structural schematic diagram of access control terminal provided by the embodiments of the present application;
Fig. 7 is a kind of structural schematic diagram of instruction process unit provided by the embodiments of the present application;
Fig. 8 is the structural schematic diagram of another access control terminal provided by the embodiments of the present application;
Fig. 9 is the structural schematic diagram of another instruction process unit provided by the embodiments of the present application;
Figure 10 is the structural schematic diagram of another access control terminal provided by the embodiments of the present application.
Specific embodiment
In order to keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with attached drawing to the application make into
One step it is described in detail.
Term " first " and " second " in the description of the present application, claims and attached drawing etc. are for distinguishing difference
Object is not use to describe a particular order.In addition, term " includes " and " having " and their any deformations, it is intended that
It covers and non-exclusive includes.Such as it contains the process, method, system, product or equipment of a series of steps or units and does not limit
Due to listed step or unit, but optionally further comprising the step of not listing or unit, or optionally further comprising it is right
In the intrinsic other step or units of these process, methods, product or equipment.
Firstly, each equipment involved in description the embodiment of the present application.
Access control terminal, in the embodiment of the present application, access control terminal can be used for access control device and open or close,
To realize the rights management for entering and leaving target area to user.Wherein, which may include cell or unit building or garden
Etc., the embodiment of the present application does not make uniqueness restriction for the specific range of the target area.The access control terminal has aobvious
Display screen, the display screen can may be for liquid crystal display other display screens here without limitation.
Cloud Server, in the embodiment of the present application, which is alternatively referred to as cloud, alternatively, being referred to as cloud platform
Deng the embodiment of the present application does not make uniqueness restriction for the title of the Cloud Server.
First user terminal can be the terminal that user uses.In the embodiment of the present application, which not only may be used
Including terminal used in the owner in target area, in some implementations, which also may include the industry
Terminal that the lessee of terminal or the owner that main kinsfolk uses uses or first user terminal can be with
The terminal etc. that worker or office worker including owner use.
Second user terminal, alternatively referred to as property terminal, that is to say, that the second user terminal can be in target area
Property used in terminal, or the terminal etc. that administrative staff referred to as in target area use.
Above-mentioned the first user terminal and second user terminal includes being not limited to the terminals such as smart phone, PAD, computer to set
It is standby.
Channel unit may include one or more in access control equipment and lift facility.Wherein, which can be with
Indicate the access control equipment on stair doorway.It is understood that the channel unit is also possible that other titles etc., the embodiment of the present application is not made
It limits.
Smart home device can be smart home device used in target user's family, such as intelligent air condition, intelligence electricity
Depending on, Intelligent purifying device etc., the embodiment of the present application does not make uniqueness restriction for the smart home device.
It is a kind of gate inhibition provided by the embodiments of the present application referring to Fig. 1, Fig. 1 for vivider understanding the embodiment of the present application
The configuration diagram of management system.As shown in Figure 1, the system includes: access control terminal 101, entrance guard device 102, cloud service
Device 103, the first user terminal 104 and second user terminal 105.
Wherein, Cloud Server can be connect with one or more access control terminals simultaneously, that is to say, that the application is implemented
In example, which can manage multiple target areas simultaneously.It is connect by Cloud Server with access control terminal, Ke Yiyou
Effect is avoided due to installing server in each target area, and increases the cost of deployment server.To pass through Cloud Server
Management objectives region can not only reduce the cost of deployment services device, also effectively reduce the maintenance work of server.On the other hand,
Multiple target areas are managed by Cloud Server, also add the mobility of information between different target region.
Further, which can also connect with the first user terminal communication, and, which can also be with
The communication connection of second user terminal.
Wherein, access control terminal can not only be communicated to connect with Cloud Server, can also respectively with the first user terminal
It is communicated to connect with second user terminal.
Optionally, the mode of communication connection may include in a manner of purple peak agreement (Zigbee), with bluetooth (Bluetooth)
Mode, in the mode of WLAN (wireless local area networks, WLAN) and with mobile network
The mode of (also known as cellular network) etc. it is any can communicatively, the embodiment of the present application for the communication connection mode not
Make uniqueness restriction.It is understood that the communication mode of mobile network may include long term evolution (long term evolution,
LTE mode), increment type LTE (advance LTE, LTE-A), or can also include the mode of the following mobile network communication
Etc., the embodiment of the present application does not make uniqueness restriction for the communication mode of mobile network.
It is understood that system architecture shown in FIG. 1 is only a kind of example, and in the concrete realization, access control terminal, gate inhibition's dress
Set, Cloud Server, the first user terminal and second user terminal may further include other forms, therefore, should not will be shown in FIG. 1
System architecture is interpreted as having limiting meaning to the embodiment of the present application.
By access control system provided by the embodiment of the present application, user can be facilitated to pass in and out target area, improve user
Pass in and out the safety of target area.
As one embodiment, the embodiment of the present application also provides a kind of entrance guard managements to apply (application, APP),
The entrance guard management application can be applied in the first user terminal, second user terminal, access control terminal and Cloud Server.
In the concrete realization, the first user terminal, second user terminal, access control terminal and Cloud Server, which log in, divides
Not after entrance guard management application, access control management method provided by the embodiment of the present application can be performed.
If access control terminal is by logging in the entrance guard management application, can be used for for obtaining target facial image, to mesh
Mark facial image is verified, and verification result is obtained, and the attribute of target user is obtained according to verification result, is used according to target
The attribute at family obtains the first control instruction, and the first control instruction is sent to entrance guard device with access control device;Wherein, mesh
The facial image that facial image is target user is marked, target user is the user to be determined for whether allowing access into target area.
For another example, access control terminal is also used to generate the current record of target user by the login entrance guard management application,
And current record is uploaded to Cloud Server;Wherein, current record includes transit time, current address and target facial image
At least one of;
Cloud Server is by logging in the entrance guard management application, for receiving the current record from access control terminal, and
Save current record.
For another example, access control terminal is specifically used for being that verifying is lost in response to verification result by logging in entrance guard management application
In the case where losing, judge whether target user is black list user;In the case where being judged as YES, send the first prompt information to
Second user terminal;In the case where being judged as NO, the first control instruction is obtained according to the feedback information of the first user terminal, and
First control instruction is sent to entrance guard device with access control device;
First user terminal is by logging in entrance guard management application, in the case where access control terminal is judged as NO,
Feedback information is sent to access control terminal;
Second user terminal is by logging in entrance guard management application, in the case where access control terminal is judged as YES,
Receive the first prompt information from access control terminal.
It is understood that the above is only a kind of example, the first user terminal, second user terminal, access control terminal and cloud
The specific implementation of server can also be corresponded to reference to Fig. 3 and method shown in fig. 5.That is, in Fig. 3 to Fig. 5 institute
In the access control management method shown, the first user terminal, second user terminal, access control terminal and Cloud Server can also be distinguished
For logging in entrance guard management application, thereby executing Fig. 3 to access control management method shown in fig. 5.Therefore, no longer detailed one by one here
It states.
Optionally, referring to fig. 2, Fig. 2 is the configuration diagram of another access control system provided by the embodiments of the present application,
As shown in Fig. 2, the system includes: access control terminal 101, entrance guard device 102, Cloud Server 103, the first user terminal 104
With second user terminal 105, channel unit 106 and smart home device 107.
Wherein, channel unit can be communicated to connect with access control terminal.Smart home device can not only be controlled with gate inhibition
Terminal communication connection processed, can also be communicated to connect with Cloud Server etc..
It is understood that access control terminal, entrance guard device, Cloud Server, the first user terminal and second user terminal tool
Body implementation can refer to system shown in FIG. 1, and which is not described herein again.
Wherein, for Fig. 1 and access control system shown in Fig. 2, such as access control terminal, entrance guard device, cloud are taken
Be engaged in device, the first user terminal and second user terminal concrete methods of realizing can Fig. 3 to access control management method shown in fig. 5.
It is a kind of access control management method provided by the embodiments of the present application referring to Fig. 3, Fig. 3, which can apply
In Fig. 1 and access control terminal shown in Fig. 2, as shown in figure 3, this method comprises:
301, access control terminal obtains target facial image;Wherein, target facial image is the face figure of target user
Picture, target user are the user to be determined for whether allowing access into target area.
In the embodiment of the present application, target user is the user needed into target area, and access control terminal is needed to test
Whether card allows the target user to enter the target area.
In the embodiment of the present application, access control terminal can obtain mesh by the camera connecting with the access control terminal
Mark facial image.Alternatively, the access control terminal can also be obtained by the camera being built in the access control terminal
Target facial image.For example, which captures someone (i.e. target user) close to the door by camera
When prohibiting controlling terminal, target facial image can be obtained by camera.I.e. the camera can be always held at working condition.
Or the access control terminal restarts camera in the case where sensing that someone is close by infrared inductor, from
And obtain target facial image.The infrared inductor is the infrared inductor connecting with the access control terminal.
Optionally, the camera connecting with the access control terminal can also record user (including target user) and pass in and out mesh
The video etc. in region is marked, the embodiment of the present application is not construed as limiting.Wherein, after the video for being recorded to user's disengaging target area,
The video can also be sent to Cloud Server by the access control terminal, so that the Cloud Server is made to save the video, in order to
Subsequent calls video.
302, access control terminal verifies target facial image, obtains verification result.
In the embodiment of the present application, access control terminal verifies target facial image, i.e. the access control terminal pair
The identity information of the target facial image is verified.
303, the attribute that target user is obtained according to verification result obtains control instruction, control according to the attribute of target user
System instruction includes the first control instruction, and the first control instruction is for being sent to entrance guard device with access control device.
In the embodiment of the present application, it is to belong to white list user that the attribute of target user, which can be understood as target user, still
Black list user or strange visitor, the strange visitor be both not belonging to white list user, and be also not belonging to black list user, such as may be used
To include courier, take-away personnel etc..Therefore, it can be reserved for white list user in the access control terminal and blacklist used
Family, white list user can be regarded as allowing access into the user of target area, alternatively, white list user can be understood as having stepped on
The user to record a demerit, alternatively, white list user can also be understood that the user to live in target area;The black list user is appreciated that
For the user for being rejected for entry into target area, alternatively, the black list user may also be understood to be dangerous user, such as wanted person
Deng, the embodiment of the present application uniqueness restriction is not made for white list user and black list user.
White list user and black list user are preserved in access control terminal.That is, in the access control terminal
Preserve the identity of white list user and the identity of black list user, wherein the identity includes at least face
Image.Optionally, which can also include the identity of identification number such as ID card No. or resident in target area
Number etc..Optionally, which can also be including telephone number etc..
In the embodiment of the present application, the first control instruction is obtained according to the attribute of target user, and the first control instruction is sent out
It send to entrance guard device with access control device, it will be appreciated that first can be generated according to the attribute of target user for access control terminal
Control instruction, so that first control instruction is sent to entrance guard device, which can be used for access control device
Open or close etc., the content that the embodiment of the present application specifically controls first control instruction is not construed as limiting.
Implement the embodiment of the present application, target facial image is directly obtained by access control terminal, to the target face
Image is verified, and can be controlled according to verification result entrance guard device, so as to allow users to directly pass through
Brush face enters target area, efficiently solves and forgets Password since user carries IC card inconvenience or user's input password
So that not only facilitating user enters target area, but also user experience has can be improved in situation, increases user satisfaction.
Further, after access control terminal obtains target facial image, method further include:
In the display screen displaying target information of access control terminal, wherein target information includes targeted advertisements.
Wherein, target information is specifically as follows the age-dependent information with target facial image;Alternatively, the target information
It can also be information relevant to the gender of target facial image etc..As access control terminal is getting target facial image
Later, the age belonging to the target facial image can be differentiated, thus display and age bracket phase belonging to target facial image
The information of pass.For example, the age belonging to target facial image is 15 years old to 20 years old, then the access control terminal can determine
The target user may be high school student or university student, to show the relevant information of study.Optionally, the access control terminal is also
Age belonging to the target facial image etc. can be differentiated by third-party application, the present embodiment does not make uniqueness restriction.
Optionally, which can also be set at camera, i.e., the display screen can be arranged with the camera at one
Position.When due to access control terminal brush face, user may greatly see display screen, therefore, by by display screen and camera
It is set together, effectively increases the value of display information.
Optionally, which may include targeted advertisements, i.e. displaying target advertisement on a display screen, such as display and mesh
The age-dependent advertisement of user is marked, alternatively, display advertisement relevant to the occupation of target user etc., broadcasts to improve advertisement
The benefit put.
Optionally, which can also show on a display screen in the case where verification result is to be proved to be successful
Show target information.Since access control terminal is able to verify that out target facial image, then greatly may the target user be the mesh
The resident in region is marked, then access control terminal can determine the occupation of the target user according to the current record of the target user
Or living habit etc., and then the access control terminal can not only determine that target is believed according to the age of the target user and gender
Breath, target information can be also determined according to the occupation of the target user, thus can increase the accuracy of target information.
Implement the present embodiment, access control terminal is according to the face characteristic of target facial image come displaying target advertisement, tool
Body, which is shown by the display screen connecting with the access control terminal, the impact effect of advertisement can be expanded.
In method shown in Fig. 3, access control terminal can obtain the first control instruction according to the attribute of target user,
And the attribute of target user can be white list user, can also be black list user, or both be not belonging to white list user,
It is not belonging to black list user again.Therefore, it will be provided below according to the attribute of target user the embodiment of the present application is described in detail
Access control management method.
Referring to fig. 4, Fig. 4 is the flow diagram of another access control management method provided by the embodiments of the present application, the gate inhibition
Management method can be applied to access control system shown in FIG. 1 and the access control management method applies also for door shown in Fig. 2
Prohibit management system.As shown in figure 4, the access control management method includes:
401, access control terminal obtains target facial image, and target facial image is the facial image of target user, mesh
Mark user is the user to be determined for whether allowing access into target area.
402, access control terminal verifies target facial image, obtains verification result.
It is understood that can refer to method shown in Fig. 3 for the specific implementation of step 401 and step 402, here no longer
It is described in detail one by one.
403, access control terminal is to determine that target user is white list in the case where being proved to be successful in response to verification result
User, wherein white list user includes: the permanent resident population of target area.
In the embodiment of the present application, access control terminal verifies target facial image, and verification result be verifying at
Function then illustrates that the access control terminal effectively has identified the target facial image, and the target facial image is to allow access into
The facial image of the user of target area.
Wherein, the permanent resident population of target area can be regarded as the user for possessing residency right in the target area, and can manage
Solution is the user in the lease house in the target area, or can be regarded as the employee to register on the books in the target area etc.
Deng the present embodiment is not construed as limiting the permanent resident population.That is, preserving white list user in access control terminal, only
It is registered in white list user, then access control terminal is to be proved to be successful to the verification result of the target user.
Optionally, white list user can be registered user.For example, which can be by answering
Registration information is received with program (application, APP), as entrance guard management APP can be installed in the first user terminal, from
And user is made to input registration information by entrance guard management APP, so that the first user terminal receives the registration information.It can
Understand, entrance guard management APP is alternatively referred to as entrance guard management client etc., and the embodiment of the present application is not construed as limiting the title.
The identity of included user includes at least the face information of the user in the registration information.Such as the user is registering
When, facial image can be uploaded.The facial image can be the image that first user terminal obtains automatically, can also be the user
The image etc. chosen from photograph album, the embodiment of the present application is not construed as limiting.
The registration information can be sent to Cloud Server after receiving the registration information by first user terminal,
So that the registration information is sent to access control terminal by Cloud Server.And then the doorway controlling terminal can be according to this
The identity of user determines white list user in registration information.
Wherein, the first user terminal can be terminal used in the owner in target area, that is to say, that can control
Permission is registered, such as only owner just has permission carry out information registering.Alternatively, first user terminal can also be in target area
Kinsfolk, terminal used in lessee and owner.It is understood that for just having permission carry out information registering in only owner
In the case where, when carrying out information registering, in registration information other than including the face information of user to be registered, may also include
The mark of first user terminal.Optionally, registration permission can be also controlled by second user terminal, that is to say, that second user
Terminal can control whether that only owner just has permission carry out information registering by entrance guard management APP.It is understood that the above is only this
A kind of implementation in registration information that embodiment provides, should not be construed as the restriction to the present embodiment.Such as having
Body realize in, registration permission can be also controlled by Cloud Server, that is to say, that Cloud Server come control whether only owner
It has permission and carries out information registering etc., this embodiment is not limited.
It is understood that the above is only the mode of determining white list user provided by the embodiment of the present application a kind of, it should not be by it
It is interpreted as the restriction to the embodiment of the present application.
404, access control terminal in response to target user be target area permanent resident population the case where, obtain control refers to
It enables, control instruction includes the first control instruction, and the first control instruction is for being sent to entrance guard device with the unlatching of access control device;
Entrance guard device receives the first control instruction from access control terminal, and access control device is opened.
It, can in the case where access control terminal determines that target user is white list user in the embodiment of the present application
The first control instruction is sent to entrance guard device, it, can access control dress after which receives first control instruction
Unlatching is set, so that target user enters target area.
405, access control terminal determines the smart home device that target user uses.
In the embodiment of the present application, access control terminal can pre-save the intelligence in the permanent resident population family in target area
Home equipment, and the permanent resident population in target area is associated with preservation with smart home device.Wherein, association preservation is appreciated that
For the identity of permanent resident population and the mark of smart home device it is corresponding save.Optionally, it can save in the form of a list often
The firmly mark of the identity of population and smart home device, alternatively, the form that can also be encoded is corresponding to save permanent resident population's
Identity and the mark of smart home device etc., the embodiment of the present application for how to save the identity of permanent resident population with
The mark of smart home device is not construed as limiting.Access control terminal saves permanent resident population and smart home device by association, can
It effectively determines smart home device used in target user, improves the practicability of access control terminal, user experience
It is good.
406, access control terminal sends open command to smart home device;Wherein, open command is used to indicate unlatching
Smart home device;Smart home device receives the open command from access control terminal, opens smart home device.
In the embodiment of the present application, access control terminal can be communicated to connect with smart home device, thus to the smart home
Equipment sends open command, to control unlatching smart home device.It is understood that the access control terminal control opens smart home
After equipment, which can execute different operations according to living habit of target user etc..Citing comes
Say, target user go home first thing be usually open air-conditioning, then the smart home device can automatically open air-conditioning, thus
It avoids user from opening air-conditioning manually, improves user satisfaction.
407, access control terminal generates the current record of target user, wherein current record includes transit time, passage
At least one of address and target facial image.
In the embodiment of the present application, access control terminal can generate the current record of target user in the form of picture, also
The current record etc. of target user can be generated in the form of video flowing.For example, access control terminal is being proved to be successful it
Afterwards, the picture including at least one of transit time, current address and target facial image can be shot by camera.It can manage
Solution, how the embodiment of the present application, which specifically generates the access control terminal current record, is not construed as limiting.
408, current record is uploaded to Cloud Server.
Cloud Server receives the current record from access control terminal.
409, Cloud Server saves current record.
In the embodiment of the present application, guarantor can be provided for the discrepancy of subsequent query target user record by saving current record
Barrier.
For example, the first user terminal needs to inquire the discrepancy record of the first user, then first user terminal
Inquiry instruction is sent to Cloud Server, which is used to inquire the current record of first user.Cloud Server is receiving
To after the inquiry instruction, the current record of the first user can be sent to first user terminal.
It is understood that including the first user in target user.Optionally, it sends and inquires to Cloud Server in the first user terminal
When instruction, search access right can be also limited, such as limits the current record for only having owner to have permission inquiry kinsfolk or lessee.And family
Front yard member or lessee do not have search access right then.Thus the identity of the first user can be also carried in the inquiry instruction and is looked into
Ask the mark of user.
It can be in the case where by the first user terminal needing to inquire the current record of lessee such as owner, in the inquiry request
The identity of the lessee and the identity of owner are carried, thus after may make Cloud Server to receive the inquiry request, it can
Determine that the owner has search access right with the identity according to owner, so that the Cloud Server is to first user terminal
Send the current record of the lessee.For another example owner needs to inquire family child by the first user terminal or the current of old man is remembered
Record, then in the inquiry request can the identity of carrying children or old man and the identity of owner so that cloud takes
Business device receive the inquiry request after, can be determined according to the identity of owner the owner have search access right, and then to this
First user terminal sends the current record of the child or old man.It is understood that identity illustrated above may include face
Information, ID card No. information, telephone number information etc. can arbitrarily indicate the information of the identity of kinsfolk, lessee.
In the embodiment of the present application, which is recorded by the current of record target user, it is ensured that such as should
The safety of child or old man allow owner to check the record for passing in and out target area from child or old man, it is ensured that safety
Property.On the other hand, which can also inquire the in and out records of lessee, so as to avoid not knowing about lessee completely, completely
Uncontrollable situation occurs, and improves owner to the percentage of intelligibility of lessee.
It is understood that it is to show in the case where white list user that embodiment shown in Fig. 4, which is target user, used in the target
In the case that family is not white list user, reference can be made to Fig. 5, Fig. 5 are another access control management methods provided by the embodiments of the present application
Flow diagram, which can be applied to access control system shown in FIG. 1 and the access control management method also
It can be applied to access control system shown in Fig. 2.As shown in figure 5, the access control management method includes:
501, access control terminal obtains target facial image;Wherein, target facial image is the face figure of target user
Picture, target user are the user to be determined for whether allowing access into target area.
502, access control terminal verifies target facial image, obtains verification result.
It is understood that can refer to method shown in Fig. 3 for the specific implementation of step 501 and step 502, here no longer
It is described in detail one by one.
503, in the case that access control terminal is authentication failed in response to verification result, judge whether target user is black
Name single user executes 504 to be;To be no, 505 are executed.
In the embodiment of the present application, verification result is authentication failed, that is to say, that the access control terminal can not automatic identification
The target user out, or can be regarded as the target user not in white list user.
Black list user can be regarded as the user for being rejected for entry into target area, alternatively, the black list user may also be understood to be
The user of dangerous class, such as the black list user may include wanted criminal and do not walk the chalks or the user of law, the application
For the black list user, specifically why user is not construed as limiting embodiment.
504, access control terminal sends the first prompt information and gives second user terminal.
In the embodiment of the present application, access control terminal judges target user for black list user, then illustrates not allowing the mesh
Mark user enters target area.To give second user terminal by sending the first prompt information, related personnel is aloowed
The target user is carried out in time arrest etc..
Wherein, which may include short message prompt information, alternatively, can also include auditory tone cues information etc.
Deng.Such as first prompt information can be such as " user for wanting to enter into target area may be wanted criminal ", alternatively, first prompt
Information can also such as " dangerous personage is on cell doorway (or unit building doorway or garden doorway) ", the embodiment of the present application pair
It is not construed as limiting in the particular content of first prompt information.
505, the first control instruction is obtained according to the feedback information of the first user terminal, and the first control instruction is sent to
Entrance guard device is with access control device.
It, should in the case where it is black list user that access control terminal, which judges target user not, in the embodiment of the present application
Access control terminal can send relevant information to the first user terminal, so that the access control terminal can be according to first
The feedback information of user terminal executes operation.
Optionally, step 505 can include: access control terminal sends the identity of confirmation target user to the first user terminal
Request;
The feelings that access control terminal is instructed in response to receiving the identity of the confirmation target user from the first user terminal
Under condition, the first control instruction is obtained, and the first control instruction is sent to entrance guard device with the unlatching of access control device;
What access control terminal was instructed in response to not receiving the identity of the confirmation target user from the first user terminal
In the case of, the request of confirmation target user's identity is sent to second user terminal
In the present embodiment, access control terminal sends the side of the request of the identity of confirmation target user to the first user terminal
Formula may include: the identity that access control terminal sends confirmation target user by way of video communication to the first user terminal
Request;Alternatively, access control terminal sends the body of confirmation target user by way of short message communication to the first user terminal
The request of part;Or access control terminal sends confirmation target to the first user terminal by other possible communication modes
Request of identity of user etc., the present embodiment are used for how access control terminal sends confirmation target to the first user terminal
The request of the identity at family is not construed as limiting.
Wherein, target facial image is included at least in the request of the identity of confirmation target user.To may make first
User terminal determines whether the identity of confirmation target user according to the target facial image, and then in the confirmation of the first user terminal
In the case of, the identity instruction of confirmation target user is sent to access control terminal.And target is confirmed in the first user terminal and uses
In the case where the identity at family, which can not be to access control terminal feedback information.In this case, access control
Terminal can send the request of confirmation target user's identity to second user terminal.
That is, in the case where the first user terminal can not confirm target user's identity, can be requested in the present embodiment
Second user terminal check.That is permission of the permission of second user terminal greater than the first user terminal.
Optionally, the case where access control terminal sends request to the second user terminal of confirmation target user's identity
Under, the above method further include:
The feelings that access control terminal is instructed in response to receiving the identity of the confirmation target user from second user terminal
Under condition, the second control instruction is obtained, and the second control instruction is sent to entrance guard device with the unlatching of access control device;
What access control terminal was instructed in response to not receiving the identity of the confirmation target user from second user terminal
In the case of, it sends the second prompt information and gives user's second user terminal.
In the present embodiment, second user terminal can be according to the request of the confirmation target user's identity received, to confirm
The identity of the target user.The related personnel as belonging to second user terminal can verify the identity card of target user, or
Person related personnel can carry out target user cross-examining etc..It is understood that the second user terminal can also register target by APP
Facial image, or authorize target user to enter target area in the given time by the APP.In second user terminal
Entrance guard management APP can be installed, so that related personnel registers target facial image by entrance guard management APP, to come
Confirm the identity of target user.It is understood that entrance guard management APP is alternatively referred to as entrance guard management client etc., the application is implemented
Example is not construed as limiting the title.
For example, to take out, courier these need often to enter and leave personnel, staff (such as property personnel) can be with
The trouble frequently registered is saved in the disengaging that a period of time is registered and authorized by second user terminal.Staff can
The case where to check take-away, courier disengaging floor, decides whether to delay or cancels authorization, is increasing convenience
High security is kept simultaneously.
Wherein, in the case where the second user terminal identity unconfirmed for passing through target user, access control terminal
The second prompt information is sent to second user terminal.
Wherein, which can be used for that the identity of the second user terminal target user is prompted not pass through confirmation etc.
Deng the embodiment of the present application is not construed as limiting second prompt information.
506, the target facial image of target user is uploaded to Cloud Server by access control terminal, and Cloud Server, which receives, to be come
From the target facial image of the target user of access control terminal.
In the embodiment of the present application, by uploading target facial image, it can be provided safeguard for subsequent query target user.
Further, in Fig. 4 and access control management method shown in fig. 5, in the case where verification result is to be proved to be successful, or
Person, in the case where receiving confirmation target user's identity instruction, Fig. 4 or method shown in fig. 5 further include:
Access control terminal determines the current channel unit of target user;
Access control terminal sends third control instruction to channel unit;Wherein, channel unit include access control equipment and
At least one of lift facility, third control instruction are used at least one in access control equipment and lift facility
It is a.
In the present embodiment, access control terminal can be attached with the channel unit in target area, and record should
The historical record of target user's access way equipment, so as to determine the current channel of the target user according to the historical record
Equipment.
Optionally, in the case where channel unit includes access control equipment, which can determine the door
After prohibiting equipment, third control instruction is sent to the access control equipment, access control equipment unlatching is such as controlled, so that target user's energy
Enough facilitate the region administered into access control equipment.
Optionally, in the case where channel unit includes lift facility, which is determining the lift facility
Later, by sending third control instruction to the lift facility, the lift facility can be made to wait automatically in default floor.Such as
The access control terminal can be by controlling lift facility, to indicate that the lift facility Stall takes elevator.It is illustrated above
Stall be only a kind of example, specially several buildings or it is several layers of can as the case may be depending on.Specifically, the access control terminal is also
The floor that the target user lives can be identified according to the historical record of target user seating lift facility, to control electricity
Terraced equipment reaches the floor that the target user lives automatically.
Implement the present embodiment, the time that target user waits elevator can be saved, improve the time efficiency of target user.
It is above-mentioned to illustrate the method for the embodiment of the present application, the device of the embodiment of the present application is provided below.
It is a kind of structural schematic diagram of access control terminal provided by the embodiments of the present application referring to Fig. 6, Fig. 6, such as Fig. 6 institute
Show, which includes:
Acquiring unit 601, for obtaining target facial image;Wherein, target facial image is the face figure of target user
Picture, target user are the user to be determined for whether allowing access into target area;
Image authentication unit 602 obtains verification result for verifying to target facial image;
Instruction process unit 603, for the attribute according to verification result acquisition target user, and according to target user's
Attribute obtains control instruction, wherein control instruction includes the first control instruction, and the first control instruction is for being sent to entrance guard device
With access control device.
Implement the embodiment of the present application, target area is entered by brush face, efficiently solves since user carries IC card not side
Just the case where or user inputs password and forgets Password, so that not only facilitating user enters target area, but also can mention
High user experience, increases user satisfaction.
Optionally, as shown in fig. 7, instruction process unit 603, comprising:
Subelement 6031 is determined, for being to determine that target user is white in the case where being proved to be successful in response to verification result
Name single user, wherein white list user includes: the permanent resident population of target area;
Instruction processing subelement 6032, in response to target user be target area permanent resident population the case where, obtain
First control instruction, and the first control instruction is sent to entrance guard device with the unlatching of access control device.
Optionally, as shown in figure 8, access control terminal further include:
Determination unit 604, the smart home device used for determining target user;
Transmission unit 605, for sending open command to smart home device;Wherein, open command is used to indicate unlatching
Smart home device.
Optionally, as shown in figure 8, in the case where verification result is to be proved to be successful, access control terminal further include:
Generation unit 606, for generating the current record of target user, wherein current record includes transit time, passage
At least one of address and target facial image;
Uploading unit 607, for that will pass through, record is uploaded to Cloud Server.
Optionally, as shown in figure 9, instruction process unit 603, comprising:
Whether judgment sub-unit 6033 judges target user in the case where being authentication failed in response to verification result
For black list user;
Instruction processing subelement 6032, in the case where being judged as NO, according to the feedback information of the first user terminal
The first control instruction is obtained, and the first control instruction is sent to entrance guard device with access control device.
Optionally, as shown in figure 9, control instruction further includes the first prompt information, instruction process unit 603 further include:
Transmission sub-unit 6034, in the case where being judged as YES, access control terminal send the first prompt information to
Second user terminal.
Optionally, instruction processing subelement 6032, specifically for sending the body of confirmation target user to the first user terminal
The request of part;
Instruction processing subelement 6032 is also used in response to receiving the confirmation target user's from the first user terminal
In the case that identity instructs, the first control instruction is obtained, and the first control instruction is sent to entrance guard device and is filled with access control
Set unlatching;
Instruction processing subelement 6032, is also used in response to not receiving the confirmation target user from the first user terminal
Identity instruction in the case where, send the request of confirmation target user's identity to second user terminal.
Optionally, instruction processing subelement 6032, is also used in response to receiving the confirmation mesh from second user terminal
In the case where the identity instruction for marking user, the second control instruction is obtained, and the second control instruction is sent to entrance guard device to control
Entrance guard device processed is opened;
Instruction processing subelement 6032, is also used in response to not receiving the confirmation target user from the first user terminal
Identity instruction in the case where, send the second prompt information give second user terminal.
Optionally, in the case where verification result is to be proved to be successful, alternatively, receiving confirmation target user's identity instruction
In the case where,
Determination unit 604 is also used to determine the channel unit that target user is current;
Transmission unit 605 is also used to send third control instruction to channel unit;Wherein, channel unit includes that gate inhibition sets
At least one of standby and lift facility, third control instruction in access control equipment and lift facility extremely
It is one few.
Optionally, uploading unit 607 are also used to the target facial image of target user being uploaded to Cloud Server.
Optionally, as shown in figure 8, access control terminal further include:
Display unit 608, for the display screen displaying target information in access control terminal, wherein target information includes
Targeted advertisements.
It is understood that can correspond to the specific implementation of access control terminal with reference to Fig. 3 to entrance guard management shown in fig. 5
The specific implementation of method, is no longer described in detail one by one here
It is the structural schematic diagram of another access control terminal provided by the embodiments of the present application referring to Figure 10, Figure 10.The door
Prohibiting controlling terminal includes processor 1001, can also include input interface 1002, output interface 1003 and memory 1004.This is defeated
It is connected with each other between incoming interface 1002, output interface 1003, memory 1004 and processor 1001 by bus.
Memory include but is not limited to be random access memory (random access memory, RAM), read-only storage
Device (read-only memory, ROM), Erasable Programmable Read Only Memory EPROM (erasable programmable read
Only memory, EPROM) or portable read-only memory (compact disc read-only memory, CD-ROM),
The memory is used for dependent instruction and data.
Input interface is used for output data and/or signal for input data and/or signal and output interface.Output
Interface and input interface can be independent device, be also possible to the device of an entirety.In the embodiment of the present application, which is connect
Mouth can also include call option etc..
Processor may include be one or more processors, for example including one or more central processing unit (central
Processing unit, CPU), in the case where processor is a CPU, which can be monokaryon CPU, be also possible to more
Core CPU.
Memory is used to store the program code and data of access control terminal.In the embodiment of the present application, which can
For storing the facial image of the user in target area.Optionally, which can also be used in the passage for storing target user
Record etc..
Processor is used to call the program code and data in the memory, executes the step in above method embodiment.
As in one embodiment, processor can be used for executing 301 to 303 shown in implementation;For another example processor is also
Implementation shown in can be used for executing 401 to 404 etc..Optionally, processor can also be used to control output interface to gate inhibition
Device sends the first control instruction.
For another example in one embodiment, processor can also be used to execute acquiring unit 601, image authentication unit 602 and refer to
Enable method shown in processing unit 603 etc..
Description in embodiment of the method can be found in for the specific implementation of processor and/or input/output interface,
This is repeated no more.
It is designed it is understood that Figure 10 illustrate only simplifying for access control terminal.In practical applications, gate inhibition is controlled
Terminal processed can also separately include necessary other elements, including but not limited to any number of input/output interface, processing
Device, controller, memory etc., and all access control terminals that the embodiment of the present application may be implemented are all in the protection model of the application
Within enclosing.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, the process
Relevant hardware can be instructed to complete by computer program, which can be stored in computer-readable storage medium, should
Program is when being executed, it may include such as the process of above-mentioned each method embodiment.And storage medium above-mentioned includes: ROM or deposits at random
Store up the medium of the various program storage codes such as memory body RAM, magnetic or disk.
Claims (10)
1. a kind of access control management method, the method is applied to access control system, and the access control system includes gate inhibition's control
Terminal processed and entrance guard device, which is characterized in that the described method includes:
The access control terminal obtains target facial image;Wherein, the target facial image is the face figure of target user
Picture, the target user are the user to be determined for whether allowing access into target area;
The access control terminal verifies the target facial image, obtains verification result;
The attribute that the target user is obtained according to the verification result obtains control according to the attribute of the target user and refers to
Enable, wherein the control instruction include the first control instruction, first control instruction for be sent to the entrance guard device with
Control the entrance guard device.
2. the method according to claim 1, wherein described obtain the target user according to the verification result
Attribute, the first control instruction is obtained according to the attribute of the target user, and first control instruction is sent to described
Entrance guard device is to control the entrance guard device, comprising:
It is to determine that the target user is white list user, wherein institute in the case where being proved to be successful in response to the verification result
State the permanent resident population that white list user includes: the target area;
The case where in response to permanent resident population that the target user is the target area, first control instruction is obtained, and
First control instruction is sent to the entrance guard device to control the entrance guard device and open.
3. according to the method described in claim 2, it is characterized in that, described be sent to the gate inhibition for first control instruction
After device is to control the entrance guard device unlatching, the method also includes:
The access control terminal determines the smart home device that the target user uses;
The access control terminal sends open command to the smart home device;Wherein, the open command is used to indicate
Open the smart home device.
4. according to the method in claim 2 or 3, which is characterized in that in the case where the verification result is to be proved to be successful,
The method also includes:
The access control terminal generates the current record of the target user, wherein the current record include transit time,
Current at least one of address and the target facial image;
The current record is uploaded to Cloud Server by the access control terminal.
5. the method according to claim 1, wherein described obtain the target user according to the verification result
Attribute, the first control instruction is obtained according to the attribute of the target user, and first control instruction is sent to described
Entrance guard device is to control the entrance guard device, comprising:
In the case where being authentication failed in response to the verification result, judge whether the target user is black list user;
In the case where being judged as NO, first control instruction is obtained according to the feedback information of the first user terminal, and by institute
It states the first control instruction and is sent to the entrance guard device to control the entrance guard device.
6. described according to the method described in claim 5, it is characterized in that, the control instruction further includes the first prompt information
Method further include:
In the case where being judged as YES, the access control terminal sends first prompt information and gives second user terminal.
7. a kind of access control terminal characterized by comprising
Acquiring unit, for obtaining target facial image;Wherein, the target facial image is the facial image of target user,
The target user is the user to be determined for whether allowing access into target area;
Image authentication unit obtains verification result for verifying to the target facial image;
Instruction process unit, for obtaining the attribute of the target user according to the verification result, and according to the target
The attribute of user obtains control instruction, wherein the control instruction includes the first control instruction, and first control instruction is used for
The entrance guard device is sent to control the entrance guard device.
8. a kind of access control terminal, which is characterized in that including processor and memory, the processor and the memory connect
It connects, computer-readable instruction is stored in the memory, when the computer-readable instruction is executed by the processor, make institute
It states processor and executes as the method according to claim 1 to 6.
9. a kind of access control system characterized by comprising access control terminal and entrance guard device;Wherein,
The access control terminal verifies the target facial image for obtaining target facial image, obtains verifying
As a result, and the attribute of the target user is obtained according to the verification result, obtained and controlled according to the attribute of the target user
System instruction, wherein the control instruction includes the first control instruction, and first control instruction is for being sent to gate inhibition's dress
It sets to control the entrance guard device;Wherein, the target facial image is the facial image of target user, and the target user is
The user to be determined for whether allowing access into target area;
The entrance guard device for receiving the first control instruction from the access control terminal, and controls gate inhibition's dress
It sets.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium
Readable instruction, the computer-readable instruction when being executed by a processor, make the processor perform claim require any one of 1-6
The method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811395117.9A CN109544748A (en) | 2018-11-21 | 2018-11-21 | Access control management method and access control terminal, system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811395117.9A CN109544748A (en) | 2018-11-21 | 2018-11-21 | Access control management method and access control terminal, system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109544748A true CN109544748A (en) | 2019-03-29 |
Family
ID=65849112
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811395117.9A Pending CN109544748A (en) | 2018-11-21 | 2018-11-21 | Access control management method and access control terminal, system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109544748A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110706387A (en) * | 2019-10-25 | 2020-01-17 | 北京首钢自动化信息技术有限公司 | Access control method and device |
CN111125409A (en) * | 2019-12-04 | 2020-05-08 | 浙江大华技术股份有限公司 | Control method and device of access control system and access control system |
CN111554025A (en) * | 2020-04-26 | 2020-08-18 | 云知声智能科技股份有限公司 | Passing method, device and system |
CN112767581A (en) * | 2020-12-31 | 2021-05-07 | 一生一石珠宝股份有限公司 | Intelligent door lock unlocking method and system based on intelligent bracelet and storage medium |
CN112907809A (en) * | 2021-01-29 | 2021-06-04 | 深圳市兴海物联科技有限公司 | Management method, system, equipment and computer storage medium |
CN113361327A (en) * | 2021-04-30 | 2021-09-07 | 福建榕融芯微电子科技有限公司 | Campus access management system and edge computing device suitable for same |
CN113810157A (en) * | 2021-09-13 | 2021-12-17 | 上海偕云信息技术有限公司 | RS485 protocol-based access control data transmission processing method and system |
CN113955600A (en) * | 2021-11-12 | 2022-01-21 | 深圳云天励飞技术股份有限公司 | Non-motor vehicle monitoring method, elevator monitoring system and storage medium |
CN114039786A (en) * | 2021-11-12 | 2022-02-11 | 浩云科技股份有限公司 | Authority verification system, equipment and computer medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103295294A (en) * | 2013-04-22 | 2013-09-11 | 大连智慧城科技有限公司 | Indoor unit-free access control system based on SIP |
CN104361664A (en) * | 2014-11-10 | 2015-02-18 | 生迪光电科技股份有限公司 | LED (Lighting Emitting Diode) lighting equipment and system and control method thereof |
CN204423460U (en) * | 2014-12-12 | 2015-06-24 | 北京中研众力科技有限公司 | There is the recognition of face access control equipment of advertising message media function |
CN104751553A (en) * | 2015-04-03 | 2015-07-01 | 厦门狄耐克电子科技有限公司 | Passive optical network (PON)-based visible intercom access control system of intelligent community |
CN105761339A (en) * | 2016-01-29 | 2016-07-13 | 成都比善科技开发有限公司 | Community access control system and method |
CN106652118A (en) * | 2016-10-20 | 2017-05-10 | 福建省家联宝智能科技有限公司 | Door control system without indoor machine |
CN106887062A (en) * | 2017-02-13 | 2017-06-23 | 合肥美信息科技有限公司 | Recognition of face advertisement gate inhibition's main frame based on high in the clouds |
KR20170082873A (en) * | 2016-01-07 | 2017-07-17 | 주식회사 얍컴퍼니 | Apparatus for controlling wireless communication of a speed gate and method for controlling gate using the same |
CN107665530A (en) * | 2017-09-26 | 2018-02-06 | 四川仪岛科技有限公司 | A kind of face identification unit gate control system and control method |
-
2018
- 2018-11-21 CN CN201811395117.9A patent/CN109544748A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103295294A (en) * | 2013-04-22 | 2013-09-11 | 大连智慧城科技有限公司 | Indoor unit-free access control system based on SIP |
CN104361664A (en) * | 2014-11-10 | 2015-02-18 | 生迪光电科技股份有限公司 | LED (Lighting Emitting Diode) lighting equipment and system and control method thereof |
CN204423460U (en) * | 2014-12-12 | 2015-06-24 | 北京中研众力科技有限公司 | There is the recognition of face access control equipment of advertising message media function |
CN104751553A (en) * | 2015-04-03 | 2015-07-01 | 厦门狄耐克电子科技有限公司 | Passive optical network (PON)-based visible intercom access control system of intelligent community |
KR20170082873A (en) * | 2016-01-07 | 2017-07-17 | 주식회사 얍컴퍼니 | Apparatus for controlling wireless communication of a speed gate and method for controlling gate using the same |
CN105761339A (en) * | 2016-01-29 | 2016-07-13 | 成都比善科技开发有限公司 | Community access control system and method |
CN106652118A (en) * | 2016-10-20 | 2017-05-10 | 福建省家联宝智能科技有限公司 | Door control system without indoor machine |
CN106887062A (en) * | 2017-02-13 | 2017-06-23 | 合肥美信息科技有限公司 | Recognition of face advertisement gate inhibition's main frame based on high in the clouds |
CN107665530A (en) * | 2017-09-26 | 2018-02-06 | 四川仪岛科技有限公司 | A kind of face identification unit gate control system and control method |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110706387A (en) * | 2019-10-25 | 2020-01-17 | 北京首钢自动化信息技术有限公司 | Access control method and device |
CN111125409A (en) * | 2019-12-04 | 2020-05-08 | 浙江大华技术股份有限公司 | Control method and device of access control system and access control system |
CN111125409B (en) * | 2019-12-04 | 2023-07-14 | 浙江大华技术股份有限公司 | Control method and device of access control system and access control system |
CN111554025A (en) * | 2020-04-26 | 2020-08-18 | 云知声智能科技股份有限公司 | Passing method, device and system |
CN112767581A (en) * | 2020-12-31 | 2021-05-07 | 一生一石珠宝股份有限公司 | Intelligent door lock unlocking method and system based on intelligent bracelet and storage medium |
CN112907809A (en) * | 2021-01-29 | 2021-06-04 | 深圳市兴海物联科技有限公司 | Management method, system, equipment and computer storage medium |
CN113361327A (en) * | 2021-04-30 | 2021-09-07 | 福建榕融芯微电子科技有限公司 | Campus access management system and edge computing device suitable for same |
CN113810157A (en) * | 2021-09-13 | 2021-12-17 | 上海偕云信息技术有限公司 | RS485 protocol-based access control data transmission processing method and system |
CN113955600A (en) * | 2021-11-12 | 2022-01-21 | 深圳云天励飞技术股份有限公司 | Non-motor vehicle monitoring method, elevator monitoring system and storage medium |
CN114039786A (en) * | 2021-11-12 | 2022-02-11 | 浩云科技股份有限公司 | Authority verification system, equipment and computer medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109544748A (en) | Access control management method and access control terminal, system | |
US11887420B2 (en) | Electronic access control and location tracking system | |
CN107492168B (en) | A kind of access control system of residential community and door opening method based on cloud service | |
US9424699B2 (en) | Electronic access control and location tracking system | |
CN105976471B (en) | A kind of access control equipment, caller management method and system | |
CN106056707A (en) | Residential quarter network access control scheme | |
CN105741395A (en) | Entrance guard access method and system based on two-dimension code and face identification | |
CN107507305A (en) | A kind of access control system of residential community and door opening method based on wechat | |
CN107705394B (en) | WeChat platform-based community access control door opening method and system | |
CN113053013B (en) | Access control method and device based on face recognition, computer equipment and medium | |
CN106897959A (en) | A kind of intelligent Community safety-protection system based on Internet of Things | |
CN106302547A (en) | Type hotel occupancy management system and method | |
CN110494898A (en) | With wireless and face recognition entrance monitoring system | |
MX2013011116A (en) | Distribution of premises access information. | |
CN110494897A (en) | Enter monitoring system with wireless and face recognition visitor | |
CN108946348A (en) | A kind of elevator control method based on recognition of face | |
CN110491008A (en) | A kind of community-based managing caller side and system, storage medium | |
CN111373453A (en) | Entrance monitoring system with radio and face recognition mechanism | |
CN105913529B (en) | A kind of the unlocking control method and system of networked door access control | |
CN108198309A (en) | The safety check traffic system and identification verification method veritified based on IMSI number | |
CN210795408U (en) | Take advantage of terraced system based on cell-phone bluetooth communication | |
CN105678869A (en) | Entrance guard intelligent controller, entrance guard intelligent control system and entrance guard opening method thereof | |
CN107055235A (en) | The elevator intelligent control method and system of the outer visitor of a kind of reply | |
US20220222995A1 (en) | System for analyzing and attesting physical access | |
CN116912041A (en) | Entrance management method based on network house-making and civil-hosting |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190329 |