CN109544748A - Access control management method and access control terminal, system - Google Patents

Access control management method and access control terminal, system Download PDF

Info

Publication number
CN109544748A
CN109544748A CN201811395117.9A CN201811395117A CN109544748A CN 109544748 A CN109544748 A CN 109544748A CN 201811395117 A CN201811395117 A CN 201811395117A CN 109544748 A CN109544748 A CN 109544748A
Authority
CN
China
Prior art keywords
user
target
access control
instruction
entrance guard
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811395117.9A
Other languages
Chinese (zh)
Inventor
佘忠华
马堃
庄南庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Sensetime Technology Co Ltd
Original Assignee
Shenzhen Sensetime Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Sensetime Technology Co Ltd filed Critical Shenzhen Sensetime Technology Co Ltd
Priority to CN201811395117.9A priority Critical patent/CN109544748A/en
Publication of CN109544748A publication Critical patent/CN109544748A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Abstract

This application discloses a kind of access control management method and access control terminals, system.Wherein, this method comprises: the access control terminal obtains target facial image;Wherein, the target facial image is the facial image of target user, and the target user is the user to be determined for whether allowing access into target area;The access control terminal verifies the target facial image, obtains verification result;The attribute of the target user is obtained according to the verification result, control instruction is obtained according to the attribute of the target user, wherein, the control instruction includes the first control instruction, and first control instruction is for being sent to the entrance guard device to control the entrance guard device.Using the application, the efficiency that user passes in and out target area can be effectively improved.

Description

Access control management method and access control terminal, system
Technical field
This application involves internet of things field more particularly to a kind of access control management method and access control terminals, system.
Background technique
Currently, most of residential area or unit building require to be managed the personnel in the personnel of disengaging.One As for, the administrative staff of residential area or unit building can be provided integrated circuit to cell personnel (integrated circuit, IC) block, so that cell can be passed in and out by brush IC card when cell personnel pass in and out cell.Alternatively, doorway machine can also be passed through The form of gate inhibition, when so that cell personnel passing in and out cell, as long as correctly entering gate inhibition's password, so that it may freely enter and leave cell.
However, user can be made to pass in and out the inefficiency of cell using aforesaid way.
Summary of the invention
This application provides a kind of access control management method and access control terminals, system, can effectively improve user and pass in and out mesh The efficiency for marking region, facilitates user to the greatest extent.
In a first aspect, the embodiment of the present application provides a kind of access control management method, the method is applied to entrance guard management system System, the access control system includes access control terminal and entrance guard device, which comprises
The access control terminal obtains target facial image;Wherein, the target facial image is the people of target user Face image, the target user are the user to be determined for whether allowing access into target area;
The access control terminal verifies the target facial image, obtains verification result;
The attribute that the target user is obtained according to the verification result is obtained according to the attribute of the target user and is controlled Instruction, wherein the control instruction includes the first control instruction, and first control instruction is for being sent to the entrance guard device To control the entrance guard device.
Implement the embodiment of the present application, target area is entered by brush face, efficiently solves since user carries IC card not side Just the case where or user inputs password and forgets Password, so that not only facilitating user enters target area, but also can mention High user experience, increases user satisfaction.
As a kind of possible implementation, the attribute that the target user is obtained according to the verification result, root According to the target user attribute obtain the first control instruction, and by first control instruction be sent to the entrance guard device with Control the entrance guard device, comprising:
It is to determine that the target user is white list user in the case where being proved to be successful in response to the verification result, In, the white list user includes: the permanent resident population of the target area;
In response to the target user be the target area permanent resident population the case where, obtain it is described first control refers to It enables, and first control instruction is sent to the entrance guard device to control the entrance guard device and open.
It is described that first control instruction is sent to the entrance guard device to control as a kind of possible implementation After the entrance guard device is opened, the method also includes:
The access control terminal determines the smart home device that the target user uses;
The access control terminal sends open command to the smart home device;Wherein, the open command is used for The smart home device is opened in instruction.
As a kind of possible implementation, in the case where the verification result is to be proved to be successful, the method is also wrapped It includes:
The access control terminal generates the current record of the target user, wherein the current record includes passing through Time, current at least one of address and the target facial image;
The current record is uploaded to Cloud Server by the access control terminal.
As a kind of possible implementation, the attribute that the target user is obtained according to the verification result, root According to the target user attribute obtain the first control instruction, and by first control instruction be sent to the entrance guard device with Control the entrance guard device, comprising:
In the case where being authentication failed in response to the verification result, judge whether the target user is that blacklist is used Family;
In the case where being judged as NO, first control instruction is obtained according to the feedback information of the first user terminal, and First control instruction is sent to the entrance guard device to control the entrance guard device.
As a kind of possible implementation, the control instruction further includes the first prompt information, the method also includes:
In the case where being judged as YES, the access control terminal sends first prompt information to second user end End.
It is described that first control is obtained according to the feedback information of the first user terminal as a kind of possible implementation Instruction, and first control instruction is sent to the entrance guard device to control the entrance guard device, comprising:
The request for confirming the identity of the target user is sent to first user terminal;
In the case where identity instruction in response to receiving the confirmation target user from first user terminal, First control instruction is obtained, and first control instruction is sent to the entrance guard device to control the entrance guard device It opens;
The case where identity in response to not receiving the confirmation target user from first user terminal instructs Under, it sends and confirms the request of target user's identity to the second user terminal.
As a kind of possible implementation, the request for sending the identity for confirming the target user to described second After user terminal, the method also includes:
In the case where identity instruction in response to receiving the confirmation target user from the second user terminal, The second control instruction is obtained, and second control instruction is sent to the entrance guard device and is opened with controlling the entrance guard device It opens;
The case where identity in response to not receiving the confirmation target user from the second user terminal instructs Under, the second prompt information is sent to user's second user terminal.
As a kind of possible implementation, in the case where the verification result is to be proved to be successful, alternatively, receiving In the case where confirming target user's identity instruction, the method also includes:
Determine the current channel unit of the target user;
Third control instruction is sent to the channel unit;Wherein, the channel unit includes access control equipment and elevator At least one of equipment, the third control instruction is for controlling in the access control equipment and the lift facility At least one.
As a kind of possible implementation, the method also includes:
The target facial image of the target user is uploaded to the Cloud Server by the access control terminal.
As a kind of possible implementation, after the access control terminal obtains target facial image, the method Further include:
In the display screen displaying target information of the access control terminal, wherein the target information includes targeted advertisements.
Second aspect, the embodiment of the present application also provides a kind of access control systems, comprising: access control terminal and gate inhibition Device, wherein
The access control terminal verifies the target facial image for obtaining target facial image, obtains Verification result, and the attribute of the target user is obtained according to the verification result, it is obtained according to the attribute of the target user Take control instruction, wherein the control instruction includes the first control instruction, and first control instruction is for being sent to the door Prohibit device to control the entrance guard device;Wherein, the target facial image is the facial image of target user, and the target is used Family is the user to be determined for whether allowing access into target area;
The entrance guard device for receiving the first control instruction from the access control terminal, and controls the door Prohibit device.
As a kind of possible implementation, the access control terminal, specifically for being in response to the verification result In the case where being proved to be successful, determine that the target user is white list user, wherein the white list user includes: the mesh Mark the permanent resident population in region;And in response to the target user be the target area permanent resident population the case where, obtain institute The first control instruction is stated, and first control instruction is sent to the entrance guard device to control the entrance guard device and open;
The entrance guard device specifically for receiving first control instruction from the access control terminal, and is controlled The entrance guard device is made to open.
As a kind of possible implementation, the access control system further includes Cloud Server,
The access control terminal is also used to generate the current record of the target user, and will be on the current record Reach Cloud Server;Wherein, the current record include in transit time, current address and the target facial image extremely Few one kind;
The Cloud Server for receiving the current record from the access control terminal, and saves described logical Row record.
As a kind of possible implementation, the access control system further includes that the first user terminal and second user are whole End, the control instruction further includes the first prompt information,
The access control terminal is specifically used in the case where being authentication failed in response to the verification result, judges institute State whether target user is black list user;In the case where being judged as YES, sends the first prompt information and give second user terminal; In the case where being judged as NO, first control instruction is obtained according to the feedback information of the first user terminal, and by described the One control instruction is sent to the entrance guard device to control the entrance guard device;
First user terminal, in the case where the access control terminal is judged as NO, Xiang Suoshu gate inhibition to be controlled Terminal processed sends feedback information;
The second user terminal, for receiving from described in the case where the access control terminal is judged as YES First prompt information of access control terminal.
In one possible implementation, the access control terminal is specifically used for sending out to first user terminal Send the request for confirming the identity of the target user;In response to receiving the confirmation target from first user terminal In the case where the identity instruction of user, first control instruction is obtained, and first control instruction is sent to the door Prohibit device and is opened with controlling the entrance guard device;In response to not receiving the confirmation target from first user terminal In the case where the identity instruction of user, sends and confirm the request of target user's identity to the second user terminal;
First user terminal, specifically for receiving the confirmation target user's from the access control terminal The request of identity, and the identity instruction for confirming the target user is sent to the access control terminal;
The second user terminal is also used to receive the body of the confirmation target user from the access control terminal The request of part.
As a kind of possible implementation, the access control terminal is also used to come from described the in response to receiving In the case where the identity instruction of the confirmation target user of two user terminals, the second control instruction is obtained, and by described second Control instruction is sent to the entrance guard device to control the entrance guard device and open;It is used in response to not receiving from described second In the case where the identity instruction of the confirmation target user of family terminal, the second prompt information is sent to user's second user Terminal;
The second user terminal, the identity for being also used to send the confirmation target user to the access control terminal refer to It enables, alternatively, receiving the second prompt information from the access control terminal.
As a kind of possible implementation, in the case where the verification result is to be proved to be successful, alternatively, receiving In the case where confirming target user's identity instruction,
The access control terminal is also used to determine the current channel unit of the target user;And to the channel Equipment sends third control instruction;Wherein, the channel unit includes at least one of access control equipment and lift facility, institute State third control instruction for control in the access control equipment and the lift facility at least one of.
As a kind of possible implementation, the access control terminal is also used to the target person of the target user Face image is uploaded to the Cloud Server;
The Cloud Server is also used to receive the target face figure of the target user from the access control terminal Picture.
As a kind of possible implementation, the access control terminal is also used in the aobvious of the access control terminal Display screen displaying target information, wherein the target information includes targeted advertisements.
The third aspect, the embodiment of the present application provide a kind of access control terminal, comprising:
Acquiring unit, for obtaining target facial image;Wherein, the target facial image is the face figure of target user Picture, the target user are the user to be determined for whether allowing access into target area;
Image authentication unit obtains verification result for verifying to the target facial image;
Instruction process unit, for obtaining the attribute of the target user according to the verification result, and according to described The attribute of target user obtains control instruction, wherein the control instruction includes the first control instruction, first control instruction For being sent to the entrance guard device to control the entrance guard device.
As a kind of possible implementation, described instruction processing unit, comprising:
Subelement is determined, for being in the case where being proved to be successful, to determine the target user in response to the verification result For white list user, wherein the white list user includes: the permanent resident population of the target area;
Instruction processing subelement, in response to the target user be the target area permanent resident population the case where, First control instruction is obtained, and first control instruction is sent to the entrance guard device to control the entrance guard device It opens.
As a kind of possible implementation, the access control terminal further include:
Determination unit, the smart home device used for determining the target user;
Transmission unit, for sending open command to the smart home device;Wherein, the open command is used to indicate Open the smart home device.
As a kind of possible implementation, in the case where the verification result is to be proved to be successful, the access control Terminal further include:
Generation unit, for generating the current record of the target user, wherein when the current record includes current Between, current at least one of address and the target facial image;
Uploading unit, for the current record to be uploaded to Cloud Server.
As a kind of possible implementation, described instruction processing unit, comprising:
Judgment sub-unit judges the target user in the case where being authentication failed in response to the verification result It whether is black list user;
Instruction processing subelement, for being obtained according to the feedback information of the first user terminal in the case where being judged as NO First control instruction, and first control instruction is sent to the entrance guard device to control the entrance guard device.
As a kind of possible implementation, the control instruction further includes the first prompt information, and described instruction processing is single Member further include:
Transmission sub-unit, in the case where being judged as YES, the access control terminal send the first prompt information to Second user terminal.
As a kind of possible implementation, described instruction handles subelement, is specifically used for first user terminal Send the request for confirming the identity of the target user;
Described instruction handles subelement, is also used in response to receiving the confirmation mesh from first user terminal In the case where the identity instruction for marking user, first control instruction is obtained, and first control instruction is sent to described Entrance guard device is opened with controlling the entrance guard device;
Described instruction handles subelement, is also used in response to not receiving described in the confirmation from first user terminal In the case where the identity instruction of target user, sends and confirm the request of target user's identity to the second user terminal.
As a kind of possible implementation, described instruction handles subelement, is also used in response to receiving from described In the case where the identity instruction of the confirmation target user of second user terminal, the second control instruction is obtained, and by described the Two control instructions are sent to the entrance guard device to control the entrance guard device and open;
Described instruction handles subelement, is also used in response to not receiving described in the confirmation from first user terminal In the case where the identity instruction of target user, the second prompt information is sent to the second user terminal.
As a kind of possible implementation, in the case where the verification result is to be proved to be successful, alternatively, receiving In the case where confirming target user's identity instruction,
The determination unit is also used to determine the current channel unit of the target user;
Transmission unit is also used to send third control instruction to the channel unit;Wherein, the channel unit includes door Prohibit at least one of equipment and lift facility, the third control instruction is for controlling the access control equipment and the electricity At least one of in terraced equipment.
As a kind of possible implementation, the access control terminal further include:
Uploading unit, for the target facial image of the target user to be uploaded to the Cloud Server.
As a kind of possible implementation, the access control terminal further include:
Display unit, for the display screen displaying target information in the access control terminal, wherein the target information Including targeted advertisements.
Fourth aspect, the embodiment of the present application also provides a kind of access control terminals, comprising: processor and memory, institute It states processor to connect with the memory, computer-readable instruction, the computer-readable instruction is stored in the memory When being executed by the processor, the processor is made to execute such as the described in any item methods of first aspect.
As a kind of possible implementation, the access control terminal can also include input/output interface, described defeated Enter output interface, for supporting the communication between the access control terminal and other equipment.
5th aspect, the embodiment of the present application provide a kind of computer readable storage medium, the computer-readable storage Program instruction is stored in medium, when run on a computer, so that computer executes method described in the various aspects.
6th aspect, the embodiment of the present application provides a kind of computer program product comprising instruction, when it is in computer When upper operation, so that computer executes method described in the various aspects.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application or in background technique below will be implemented the application Attached drawing needed in example or background technique is illustrated.
Fig. 1 is a kind of configuration diagram of access control system provided by the embodiments of the present application;
Fig. 2 is the configuration diagram of another access control system provided by the embodiments of the present application;
Fig. 3 is a kind of flow diagram of access control management method provided by the embodiments of the present application;
Fig. 4 is the flow diagram of another access control management method provided by the embodiments of the present application;
Fig. 5 is the flow diagram provided by the embodiments of the present application for having a kind of access control management method;
Fig. 6 is a kind of structural schematic diagram of access control terminal provided by the embodiments of the present application;
Fig. 7 is a kind of structural schematic diagram of instruction process unit provided by the embodiments of the present application;
Fig. 8 is the structural schematic diagram of another access control terminal provided by the embodiments of the present application;
Fig. 9 is the structural schematic diagram of another instruction process unit provided by the embodiments of the present application;
Figure 10 is the structural schematic diagram of another access control terminal provided by the embodiments of the present application.
Specific embodiment
In order to keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with attached drawing to the application make into One step it is described in detail.
Term " first " and " second " in the description of the present application, claims and attached drawing etc. are for distinguishing difference Object is not use to describe a particular order.In addition, term " includes " and " having " and their any deformations, it is intended that It covers and non-exclusive includes.Such as it contains the process, method, system, product or equipment of a series of steps or units and does not limit Due to listed step or unit, but optionally further comprising the step of not listing or unit, or optionally further comprising it is right In the intrinsic other step or units of these process, methods, product or equipment.
Firstly, each equipment involved in description the embodiment of the present application.
Access control terminal, in the embodiment of the present application, access control terminal can be used for access control device and open or close, To realize the rights management for entering and leaving target area to user.Wherein, which may include cell or unit building or garden Etc., the embodiment of the present application does not make uniqueness restriction for the specific range of the target area.The access control terminal has aobvious Display screen, the display screen can may be for liquid crystal display other display screens here without limitation.
Cloud Server, in the embodiment of the present application, which is alternatively referred to as cloud, alternatively, being referred to as cloud platform Deng the embodiment of the present application does not make uniqueness restriction for the title of the Cloud Server.
First user terminal can be the terminal that user uses.In the embodiment of the present application, which not only may be used Including terminal used in the owner in target area, in some implementations, which also may include the industry Terminal that the lessee of terminal or the owner that main kinsfolk uses uses or first user terminal can be with The terminal etc. that worker or office worker including owner use.
Second user terminal, alternatively referred to as property terminal, that is to say, that the second user terminal can be in target area Property used in terminal, or the terminal etc. that administrative staff referred to as in target area use.
Above-mentioned the first user terminal and second user terminal includes being not limited to the terminals such as smart phone, PAD, computer to set It is standby.
Channel unit may include one or more in access control equipment and lift facility.Wherein, which can be with Indicate the access control equipment on stair doorway.It is understood that the channel unit is also possible that other titles etc., the embodiment of the present application is not made It limits.
Smart home device can be smart home device used in target user's family, such as intelligent air condition, intelligence electricity Depending on, Intelligent purifying device etc., the embodiment of the present application does not make uniqueness restriction for the smart home device.
It is a kind of gate inhibition provided by the embodiments of the present application referring to Fig. 1, Fig. 1 for vivider understanding the embodiment of the present application The configuration diagram of management system.As shown in Figure 1, the system includes: access control terminal 101, entrance guard device 102, cloud service Device 103, the first user terminal 104 and second user terminal 105.
Wherein, Cloud Server can be connect with one or more access control terminals simultaneously, that is to say, that the application is implemented In example, which can manage multiple target areas simultaneously.It is connect by Cloud Server with access control terminal, Ke Yiyou Effect is avoided due to installing server in each target area, and increases the cost of deployment server.To pass through Cloud Server Management objectives region can not only reduce the cost of deployment services device, also effectively reduce the maintenance work of server.On the other hand, Multiple target areas are managed by Cloud Server, also add the mobility of information between different target region.
Further, which can also connect with the first user terminal communication, and, which can also be with The communication connection of second user terminal.
Wherein, access control terminal can not only be communicated to connect with Cloud Server, can also respectively with the first user terminal It is communicated to connect with second user terminal.
Optionally, the mode of communication connection may include in a manner of purple peak agreement (Zigbee), with bluetooth (Bluetooth) Mode, in the mode of WLAN (wireless local area networks, WLAN) and with mobile network The mode of (also known as cellular network) etc. it is any can communicatively, the embodiment of the present application for the communication connection mode not Make uniqueness restriction.It is understood that the communication mode of mobile network may include long term evolution (long term evolution, LTE mode), increment type LTE (advance LTE, LTE-A), or can also include the mode of the following mobile network communication Etc., the embodiment of the present application does not make uniqueness restriction for the communication mode of mobile network.
It is understood that system architecture shown in FIG. 1 is only a kind of example, and in the concrete realization, access control terminal, gate inhibition's dress Set, Cloud Server, the first user terminal and second user terminal may further include other forms, therefore, should not will be shown in FIG. 1 System architecture is interpreted as having limiting meaning to the embodiment of the present application.
By access control system provided by the embodiment of the present application, user can be facilitated to pass in and out target area, improve user Pass in and out the safety of target area.
As one embodiment, the embodiment of the present application also provides a kind of entrance guard managements to apply (application, APP), The entrance guard management application can be applied in the first user terminal, second user terminal, access control terminal and Cloud Server.
In the concrete realization, the first user terminal, second user terminal, access control terminal and Cloud Server, which log in, divides Not after entrance guard management application, access control management method provided by the embodiment of the present application can be performed.
If access control terminal is by logging in the entrance guard management application, can be used for for obtaining target facial image, to mesh Mark facial image is verified, and verification result is obtained, and the attribute of target user is obtained according to verification result, is used according to target The attribute at family obtains the first control instruction, and the first control instruction is sent to entrance guard device with access control device;Wherein, mesh The facial image that facial image is target user is marked, target user is the user to be determined for whether allowing access into target area.
For another example, access control terminal is also used to generate the current record of target user by the login entrance guard management application, And current record is uploaded to Cloud Server;Wherein, current record includes transit time, current address and target facial image At least one of;
Cloud Server is by logging in the entrance guard management application, for receiving the current record from access control terminal, and Save current record.
For another example, access control terminal is specifically used for being that verifying is lost in response to verification result by logging in entrance guard management application In the case where losing, judge whether target user is black list user;In the case where being judged as YES, send the first prompt information to Second user terminal;In the case where being judged as NO, the first control instruction is obtained according to the feedback information of the first user terminal, and First control instruction is sent to entrance guard device with access control device;
First user terminal is by logging in entrance guard management application, in the case where access control terminal is judged as NO, Feedback information is sent to access control terminal;
Second user terminal is by logging in entrance guard management application, in the case where access control terminal is judged as YES, Receive the first prompt information from access control terminal.
It is understood that the above is only a kind of example, the first user terminal, second user terminal, access control terminal and cloud The specific implementation of server can also be corresponded to reference to Fig. 3 and method shown in fig. 5.That is, in Fig. 3 to Fig. 5 institute In the access control management method shown, the first user terminal, second user terminal, access control terminal and Cloud Server can also be distinguished For logging in entrance guard management application, thereby executing Fig. 3 to access control management method shown in fig. 5.Therefore, no longer detailed one by one here It states.
Optionally, referring to fig. 2, Fig. 2 is the configuration diagram of another access control system provided by the embodiments of the present application, As shown in Fig. 2, the system includes: access control terminal 101, entrance guard device 102, Cloud Server 103, the first user terminal 104 With second user terminal 105, channel unit 106 and smart home device 107.
Wherein, channel unit can be communicated to connect with access control terminal.Smart home device can not only be controlled with gate inhibition Terminal communication connection processed, can also be communicated to connect with Cloud Server etc..
It is understood that access control terminal, entrance guard device, Cloud Server, the first user terminal and second user terminal tool Body implementation can refer to system shown in FIG. 1, and which is not described herein again.
Wherein, for Fig. 1 and access control system shown in Fig. 2, such as access control terminal, entrance guard device, cloud are taken Be engaged in device, the first user terminal and second user terminal concrete methods of realizing can Fig. 3 to access control management method shown in fig. 5.
It is a kind of access control management method provided by the embodiments of the present application referring to Fig. 3, Fig. 3, which can apply In Fig. 1 and access control terminal shown in Fig. 2, as shown in figure 3, this method comprises:
301, access control terminal obtains target facial image;Wherein, target facial image is the face figure of target user Picture, target user are the user to be determined for whether allowing access into target area.
In the embodiment of the present application, target user is the user needed into target area, and access control terminal is needed to test Whether card allows the target user to enter the target area.
In the embodiment of the present application, access control terminal can obtain mesh by the camera connecting with the access control terminal Mark facial image.Alternatively, the access control terminal can also be obtained by the camera being built in the access control terminal Target facial image.For example, which captures someone (i.e. target user) close to the door by camera When prohibiting controlling terminal, target facial image can be obtained by camera.I.e. the camera can be always held at working condition. Or the access control terminal restarts camera in the case where sensing that someone is close by infrared inductor, from And obtain target facial image.The infrared inductor is the infrared inductor connecting with the access control terminal.
Optionally, the camera connecting with the access control terminal can also record user (including target user) and pass in and out mesh The video etc. in region is marked, the embodiment of the present application is not construed as limiting.Wherein, after the video for being recorded to user's disengaging target area, The video can also be sent to Cloud Server by the access control terminal, so that the Cloud Server is made to save the video, in order to Subsequent calls video.
302, access control terminal verifies target facial image, obtains verification result.
In the embodiment of the present application, access control terminal verifies target facial image, i.e. the access control terminal pair The identity information of the target facial image is verified.
303, the attribute that target user is obtained according to verification result obtains control instruction, control according to the attribute of target user System instruction includes the first control instruction, and the first control instruction is for being sent to entrance guard device with access control device.
In the embodiment of the present application, it is to belong to white list user that the attribute of target user, which can be understood as target user, still Black list user or strange visitor, the strange visitor be both not belonging to white list user, and be also not belonging to black list user, such as may be used To include courier, take-away personnel etc..Therefore, it can be reserved for white list user in the access control terminal and blacklist used Family, white list user can be regarded as allowing access into the user of target area, alternatively, white list user can be understood as having stepped on The user to record a demerit, alternatively, white list user can also be understood that the user to live in target area;The black list user is appreciated that For the user for being rejected for entry into target area, alternatively, the black list user may also be understood to be dangerous user, such as wanted person Deng, the embodiment of the present application uniqueness restriction is not made for white list user and black list user.
White list user and black list user are preserved in access control terminal.That is, in the access control terminal Preserve the identity of white list user and the identity of black list user, wherein the identity includes at least face Image.Optionally, which can also include the identity of identification number such as ID card No. or resident in target area Number etc..Optionally, which can also be including telephone number etc..
In the embodiment of the present application, the first control instruction is obtained according to the attribute of target user, and the first control instruction is sent out It send to entrance guard device with access control device, it will be appreciated that first can be generated according to the attribute of target user for access control terminal Control instruction, so that first control instruction is sent to entrance guard device, which can be used for access control device Open or close etc., the content that the embodiment of the present application specifically controls first control instruction is not construed as limiting.
Implement the embodiment of the present application, target facial image is directly obtained by access control terminal, to the target face Image is verified, and can be controlled according to verification result entrance guard device, so as to allow users to directly pass through Brush face enters target area, efficiently solves and forgets Password since user carries IC card inconvenience or user's input password So that not only facilitating user enters target area, but also user experience has can be improved in situation, increases user satisfaction.
Further, after access control terminal obtains target facial image, method further include:
In the display screen displaying target information of access control terminal, wherein target information includes targeted advertisements.
Wherein, target information is specifically as follows the age-dependent information with target facial image;Alternatively, the target information It can also be information relevant to the gender of target facial image etc..As access control terminal is getting target facial image Later, the age belonging to the target facial image can be differentiated, thus display and age bracket phase belonging to target facial image The information of pass.For example, the age belonging to target facial image is 15 years old to 20 years old, then the access control terminal can determine The target user may be high school student or university student, to show the relevant information of study.Optionally, the access control terminal is also Age belonging to the target facial image etc. can be differentiated by third-party application, the present embodiment does not make uniqueness restriction.
Optionally, which can also be set at camera, i.e., the display screen can be arranged with the camera at one Position.When due to access control terminal brush face, user may greatly see display screen, therefore, by by display screen and camera It is set together, effectively increases the value of display information.
Optionally, which may include targeted advertisements, i.e. displaying target advertisement on a display screen, such as display and mesh The age-dependent advertisement of user is marked, alternatively, display advertisement relevant to the occupation of target user etc., broadcasts to improve advertisement The benefit put.
Optionally, which can also show on a display screen in the case where verification result is to be proved to be successful Show target information.Since access control terminal is able to verify that out target facial image, then greatly may the target user be the mesh The resident in region is marked, then access control terminal can determine the occupation of the target user according to the current record of the target user Or living habit etc., and then the access control terminal can not only determine that target is believed according to the age of the target user and gender Breath, target information can be also determined according to the occupation of the target user, thus can increase the accuracy of target information.
Implement the present embodiment, access control terminal is according to the face characteristic of target facial image come displaying target advertisement, tool Body, which is shown by the display screen connecting with the access control terminal, the impact effect of advertisement can be expanded.
In method shown in Fig. 3, access control terminal can obtain the first control instruction according to the attribute of target user, And the attribute of target user can be white list user, can also be black list user, or both be not belonging to white list user, It is not belonging to black list user again.Therefore, it will be provided below according to the attribute of target user the embodiment of the present application is described in detail Access control management method.
Referring to fig. 4, Fig. 4 is the flow diagram of another access control management method provided by the embodiments of the present application, the gate inhibition Management method can be applied to access control system shown in FIG. 1 and the access control management method applies also for door shown in Fig. 2 Prohibit management system.As shown in figure 4, the access control management method includes:
401, access control terminal obtains target facial image, and target facial image is the facial image of target user, mesh Mark user is the user to be determined for whether allowing access into target area.
402, access control terminal verifies target facial image, obtains verification result.
It is understood that can refer to method shown in Fig. 3 for the specific implementation of step 401 and step 402, here no longer It is described in detail one by one.
403, access control terminal is to determine that target user is white list in the case where being proved to be successful in response to verification result User, wherein white list user includes: the permanent resident population of target area.
In the embodiment of the present application, access control terminal verifies target facial image, and verification result be verifying at Function then illustrates that the access control terminal effectively has identified the target facial image, and the target facial image is to allow access into The facial image of the user of target area.
Wherein, the permanent resident population of target area can be regarded as the user for possessing residency right in the target area, and can manage Solution is the user in the lease house in the target area, or can be regarded as the employee to register on the books in the target area etc. Deng the present embodiment is not construed as limiting the permanent resident population.That is, preserving white list user in access control terminal, only It is registered in white list user, then access control terminal is to be proved to be successful to the verification result of the target user.
Optionally, white list user can be registered user.For example, which can be by answering Registration information is received with program (application, APP), as entrance guard management APP can be installed in the first user terminal, from And user is made to input registration information by entrance guard management APP, so that the first user terminal receives the registration information.It can Understand, entrance guard management APP is alternatively referred to as entrance guard management client etc., and the embodiment of the present application is not construed as limiting the title. The identity of included user includes at least the face information of the user in the registration information.Such as the user is registering When, facial image can be uploaded.The facial image can be the image that first user terminal obtains automatically, can also be the user The image etc. chosen from photograph album, the embodiment of the present application is not construed as limiting.
The registration information can be sent to Cloud Server after receiving the registration information by first user terminal, So that the registration information is sent to access control terminal by Cloud Server.And then the doorway controlling terminal can be according to this The identity of user determines white list user in registration information.
Wherein, the first user terminal can be terminal used in the owner in target area, that is to say, that can control Permission is registered, such as only owner just has permission carry out information registering.Alternatively, first user terminal can also be in target area Kinsfolk, terminal used in lessee and owner.It is understood that for just having permission carry out information registering in only owner In the case where, when carrying out information registering, in registration information other than including the face information of user to be registered, may also include The mark of first user terminal.Optionally, registration permission can be also controlled by second user terminal, that is to say, that second user Terminal can control whether that only owner just has permission carry out information registering by entrance guard management APP.It is understood that the above is only this A kind of implementation in registration information that embodiment provides, should not be construed as the restriction to the present embodiment.Such as having Body realize in, registration permission can be also controlled by Cloud Server, that is to say, that Cloud Server come control whether only owner It has permission and carries out information registering etc., this embodiment is not limited.
It is understood that the above is only the mode of determining white list user provided by the embodiment of the present application a kind of, it should not be by it It is interpreted as the restriction to the embodiment of the present application.
404, access control terminal in response to target user be target area permanent resident population the case where, obtain control refers to It enables, control instruction includes the first control instruction, and the first control instruction is for being sent to entrance guard device with the unlatching of access control device; Entrance guard device receives the first control instruction from access control terminal, and access control device is opened.
It, can in the case where access control terminal determines that target user is white list user in the embodiment of the present application The first control instruction is sent to entrance guard device, it, can access control dress after which receives first control instruction Unlatching is set, so that target user enters target area.
405, access control terminal determines the smart home device that target user uses.
In the embodiment of the present application, access control terminal can pre-save the intelligence in the permanent resident population family in target area Home equipment, and the permanent resident population in target area is associated with preservation with smart home device.Wherein, association preservation is appreciated that For the identity of permanent resident population and the mark of smart home device it is corresponding save.Optionally, it can save in the form of a list often The firmly mark of the identity of population and smart home device, alternatively, the form that can also be encoded is corresponding to save permanent resident population's Identity and the mark of smart home device etc., the embodiment of the present application for how to save the identity of permanent resident population with The mark of smart home device is not construed as limiting.Access control terminal saves permanent resident population and smart home device by association, can It effectively determines smart home device used in target user, improves the practicability of access control terminal, user experience It is good.
406, access control terminal sends open command to smart home device;Wherein, open command is used to indicate unlatching Smart home device;Smart home device receives the open command from access control terminal, opens smart home device.
In the embodiment of the present application, access control terminal can be communicated to connect with smart home device, thus to the smart home Equipment sends open command, to control unlatching smart home device.It is understood that the access control terminal control opens smart home After equipment, which can execute different operations according to living habit of target user etc..Citing comes Say, target user go home first thing be usually open air-conditioning, then the smart home device can automatically open air-conditioning, thus It avoids user from opening air-conditioning manually, improves user satisfaction.
407, access control terminal generates the current record of target user, wherein current record includes transit time, passage At least one of address and target facial image.
In the embodiment of the present application, access control terminal can generate the current record of target user in the form of picture, also The current record etc. of target user can be generated in the form of video flowing.For example, access control terminal is being proved to be successful it Afterwards, the picture including at least one of transit time, current address and target facial image can be shot by camera.It can manage Solution, how the embodiment of the present application, which specifically generates the access control terminal current record, is not construed as limiting.
408, current record is uploaded to Cloud Server.
Cloud Server receives the current record from access control terminal.
409, Cloud Server saves current record.
In the embodiment of the present application, guarantor can be provided for the discrepancy of subsequent query target user record by saving current record Barrier.
For example, the first user terminal needs to inquire the discrepancy record of the first user, then first user terminal Inquiry instruction is sent to Cloud Server, which is used to inquire the current record of first user.Cloud Server is receiving To after the inquiry instruction, the current record of the first user can be sent to first user terminal.
It is understood that including the first user in target user.Optionally, it sends and inquires to Cloud Server in the first user terminal When instruction, search access right can be also limited, such as limits the current record for only having owner to have permission inquiry kinsfolk or lessee.And family Front yard member or lessee do not have search access right then.Thus the identity of the first user can be also carried in the inquiry instruction and is looked into Ask the mark of user.
It can be in the case where by the first user terminal needing to inquire the current record of lessee such as owner, in the inquiry request The identity of the lessee and the identity of owner are carried, thus after may make Cloud Server to receive the inquiry request, it can Determine that the owner has search access right with the identity according to owner, so that the Cloud Server is to first user terminal Send the current record of the lessee.For another example owner needs to inquire family child by the first user terminal or the current of old man is remembered Record, then in the inquiry request can the identity of carrying children or old man and the identity of owner so that cloud takes Business device receive the inquiry request after, can be determined according to the identity of owner the owner have search access right, and then to this First user terminal sends the current record of the child or old man.It is understood that identity illustrated above may include face Information, ID card No. information, telephone number information etc. can arbitrarily indicate the information of the identity of kinsfolk, lessee.
In the embodiment of the present application, which is recorded by the current of record target user, it is ensured that such as should The safety of child or old man allow owner to check the record for passing in and out target area from child or old man, it is ensured that safety Property.On the other hand, which can also inquire the in and out records of lessee, so as to avoid not knowing about lessee completely, completely Uncontrollable situation occurs, and improves owner to the percentage of intelligibility of lessee.
It is understood that it is to show in the case where white list user that embodiment shown in Fig. 4, which is target user, used in the target In the case that family is not white list user, reference can be made to Fig. 5, Fig. 5 are another access control management methods provided by the embodiments of the present application Flow diagram, which can be applied to access control system shown in FIG. 1 and the access control management method also It can be applied to access control system shown in Fig. 2.As shown in figure 5, the access control management method includes:
501, access control terminal obtains target facial image;Wherein, target facial image is the face figure of target user Picture, target user are the user to be determined for whether allowing access into target area.
502, access control terminal verifies target facial image, obtains verification result.
It is understood that can refer to method shown in Fig. 3 for the specific implementation of step 501 and step 502, here no longer It is described in detail one by one.
503, in the case that access control terminal is authentication failed in response to verification result, judge whether target user is black Name single user executes 504 to be;To be no, 505 are executed.
In the embodiment of the present application, verification result is authentication failed, that is to say, that the access control terminal can not automatic identification The target user out, or can be regarded as the target user not in white list user.
Black list user can be regarded as the user for being rejected for entry into target area, alternatively, the black list user may also be understood to be The user of dangerous class, such as the black list user may include wanted criminal and do not walk the chalks or the user of law, the application For the black list user, specifically why user is not construed as limiting embodiment.
504, access control terminal sends the first prompt information and gives second user terminal.
In the embodiment of the present application, access control terminal judges target user for black list user, then illustrates not allowing the mesh Mark user enters target area.To give second user terminal by sending the first prompt information, related personnel is aloowed The target user is carried out in time arrest etc..
Wherein, which may include short message prompt information, alternatively, can also include auditory tone cues information etc. Deng.Such as first prompt information can be such as " user for wanting to enter into target area may be wanted criminal ", alternatively, first prompt Information can also such as " dangerous personage is on cell doorway (or unit building doorway or garden doorway) ", the embodiment of the present application pair It is not construed as limiting in the particular content of first prompt information.
505, the first control instruction is obtained according to the feedback information of the first user terminal, and the first control instruction is sent to Entrance guard device is with access control device.
It, should in the case where it is black list user that access control terminal, which judges target user not, in the embodiment of the present application Access control terminal can send relevant information to the first user terminal, so that the access control terminal can be according to first The feedback information of user terminal executes operation.
Optionally, step 505 can include: access control terminal sends the identity of confirmation target user to the first user terminal Request;
The feelings that access control terminal is instructed in response to receiving the identity of the confirmation target user from the first user terminal Under condition, the first control instruction is obtained, and the first control instruction is sent to entrance guard device with the unlatching of access control device;
What access control terminal was instructed in response to not receiving the identity of the confirmation target user from the first user terminal In the case of, the request of confirmation target user's identity is sent to second user terminal
In the present embodiment, access control terminal sends the side of the request of the identity of confirmation target user to the first user terminal Formula may include: the identity that access control terminal sends confirmation target user by way of video communication to the first user terminal Request;Alternatively, access control terminal sends the body of confirmation target user by way of short message communication to the first user terminal The request of part;Or access control terminal sends confirmation target to the first user terminal by other possible communication modes Request of identity of user etc., the present embodiment are used for how access control terminal sends confirmation target to the first user terminal The request of the identity at family is not construed as limiting.
Wherein, target facial image is included at least in the request of the identity of confirmation target user.To may make first User terminal determines whether the identity of confirmation target user according to the target facial image, and then in the confirmation of the first user terminal In the case of, the identity instruction of confirmation target user is sent to access control terminal.And target is confirmed in the first user terminal and uses In the case where the identity at family, which can not be to access control terminal feedback information.In this case, access control Terminal can send the request of confirmation target user's identity to second user terminal.
That is, in the case where the first user terminal can not confirm target user's identity, can be requested in the present embodiment Second user terminal check.That is permission of the permission of second user terminal greater than the first user terminal.
Optionally, the case where access control terminal sends request to the second user terminal of confirmation target user's identity Under, the above method further include:
The feelings that access control terminal is instructed in response to receiving the identity of the confirmation target user from second user terminal Under condition, the second control instruction is obtained, and the second control instruction is sent to entrance guard device with the unlatching of access control device;
What access control terminal was instructed in response to not receiving the identity of the confirmation target user from second user terminal In the case of, it sends the second prompt information and gives user's second user terminal.
In the present embodiment, second user terminal can be according to the request of the confirmation target user's identity received, to confirm The identity of the target user.The related personnel as belonging to second user terminal can verify the identity card of target user, or Person related personnel can carry out target user cross-examining etc..It is understood that the second user terminal can also register target by APP Facial image, or authorize target user to enter target area in the given time by the APP.In second user terminal Entrance guard management APP can be installed, so that related personnel registers target facial image by entrance guard management APP, to come Confirm the identity of target user.It is understood that entrance guard management APP is alternatively referred to as entrance guard management client etc., the application is implemented Example is not construed as limiting the title.
For example, to take out, courier these need often to enter and leave personnel, staff (such as property personnel) can be with The trouble frequently registered is saved in the disengaging that a period of time is registered and authorized by second user terminal.Staff can The case where to check take-away, courier disengaging floor, decides whether to delay or cancels authorization, is increasing convenience High security is kept simultaneously.
Wherein, in the case where the second user terminal identity unconfirmed for passing through target user, access control terminal The second prompt information is sent to second user terminal.
Wherein, which can be used for that the identity of the second user terminal target user is prompted not pass through confirmation etc. Deng the embodiment of the present application is not construed as limiting second prompt information.
506, the target facial image of target user is uploaded to Cloud Server by access control terminal, and Cloud Server, which receives, to be come From the target facial image of the target user of access control terminal.
In the embodiment of the present application, by uploading target facial image, it can be provided safeguard for subsequent query target user.
Further, in Fig. 4 and access control management method shown in fig. 5, in the case where verification result is to be proved to be successful, or Person, in the case where receiving confirmation target user's identity instruction, Fig. 4 or method shown in fig. 5 further include:
Access control terminal determines the current channel unit of target user;
Access control terminal sends third control instruction to channel unit;Wherein, channel unit include access control equipment and At least one of lift facility, third control instruction are used at least one in access control equipment and lift facility It is a.
In the present embodiment, access control terminal can be attached with the channel unit in target area, and record should The historical record of target user's access way equipment, so as to determine the current channel of the target user according to the historical record Equipment.
Optionally, in the case where channel unit includes access control equipment, which can determine the door After prohibiting equipment, third control instruction is sent to the access control equipment, access control equipment unlatching is such as controlled, so that target user's energy Enough facilitate the region administered into access control equipment.
Optionally, in the case where channel unit includes lift facility, which is determining the lift facility Later, by sending third control instruction to the lift facility, the lift facility can be made to wait automatically in default floor.Such as The access control terminal can be by controlling lift facility, to indicate that the lift facility Stall takes elevator.It is illustrated above Stall be only a kind of example, specially several buildings or it is several layers of can as the case may be depending on.Specifically, the access control terminal is also The floor that the target user lives can be identified according to the historical record of target user seating lift facility, to control electricity Terraced equipment reaches the floor that the target user lives automatically.
Implement the present embodiment, the time that target user waits elevator can be saved, improve the time efficiency of target user.
It is above-mentioned to illustrate the method for the embodiment of the present application, the device of the embodiment of the present application is provided below.
It is a kind of structural schematic diagram of access control terminal provided by the embodiments of the present application referring to Fig. 6, Fig. 6, such as Fig. 6 institute Show, which includes:
Acquiring unit 601, for obtaining target facial image;Wherein, target facial image is the face figure of target user Picture, target user are the user to be determined for whether allowing access into target area;
Image authentication unit 602 obtains verification result for verifying to target facial image;
Instruction process unit 603, for the attribute according to verification result acquisition target user, and according to target user's Attribute obtains control instruction, wherein control instruction includes the first control instruction, and the first control instruction is for being sent to entrance guard device With access control device.
Implement the embodiment of the present application, target area is entered by brush face, efficiently solves since user carries IC card not side Just the case where or user inputs password and forgets Password, so that not only facilitating user enters target area, but also can mention High user experience, increases user satisfaction.
Optionally, as shown in fig. 7, instruction process unit 603, comprising:
Subelement 6031 is determined, for being to determine that target user is white in the case where being proved to be successful in response to verification result Name single user, wherein white list user includes: the permanent resident population of target area;
Instruction processing subelement 6032, in response to target user be target area permanent resident population the case where, obtain First control instruction, and the first control instruction is sent to entrance guard device with the unlatching of access control device.
Optionally, as shown in figure 8, access control terminal further include:
Determination unit 604, the smart home device used for determining target user;
Transmission unit 605, for sending open command to smart home device;Wherein, open command is used to indicate unlatching Smart home device.
Optionally, as shown in figure 8, in the case where verification result is to be proved to be successful, access control terminal further include:
Generation unit 606, for generating the current record of target user, wherein current record includes transit time, passage At least one of address and target facial image;
Uploading unit 607, for that will pass through, record is uploaded to Cloud Server.
Optionally, as shown in figure 9, instruction process unit 603, comprising:
Whether judgment sub-unit 6033 judges target user in the case where being authentication failed in response to verification result For black list user;
Instruction processing subelement 6032, in the case where being judged as NO, according to the feedback information of the first user terminal The first control instruction is obtained, and the first control instruction is sent to entrance guard device with access control device.
Optionally, as shown in figure 9, control instruction further includes the first prompt information, instruction process unit 603 further include:
Transmission sub-unit 6034, in the case where being judged as YES, access control terminal send the first prompt information to Second user terminal.
Optionally, instruction processing subelement 6032, specifically for sending the body of confirmation target user to the first user terminal The request of part;
Instruction processing subelement 6032 is also used in response to receiving the confirmation target user's from the first user terminal In the case that identity instructs, the first control instruction is obtained, and the first control instruction is sent to entrance guard device and is filled with access control Set unlatching;
Instruction processing subelement 6032, is also used in response to not receiving the confirmation target user from the first user terminal Identity instruction in the case where, send the request of confirmation target user's identity to second user terminal.
Optionally, instruction processing subelement 6032, is also used in response to receiving the confirmation mesh from second user terminal In the case where the identity instruction for marking user, the second control instruction is obtained, and the second control instruction is sent to entrance guard device to control Entrance guard device processed is opened;
Instruction processing subelement 6032, is also used in response to not receiving the confirmation target user from the first user terminal Identity instruction in the case where, send the second prompt information give second user terminal.
Optionally, in the case where verification result is to be proved to be successful, alternatively, receiving confirmation target user's identity instruction In the case where,
Determination unit 604 is also used to determine the channel unit that target user is current;
Transmission unit 605 is also used to send third control instruction to channel unit;Wherein, channel unit includes that gate inhibition sets At least one of standby and lift facility, third control instruction in access control equipment and lift facility extremely It is one few.
Optionally, uploading unit 607 are also used to the target facial image of target user being uploaded to Cloud Server.
Optionally, as shown in figure 8, access control terminal further include:
Display unit 608, for the display screen displaying target information in access control terminal, wherein target information includes Targeted advertisements.
It is understood that can correspond to the specific implementation of access control terminal with reference to Fig. 3 to entrance guard management shown in fig. 5 The specific implementation of method, is no longer described in detail one by one here
It is the structural schematic diagram of another access control terminal provided by the embodiments of the present application referring to Figure 10, Figure 10.The door Prohibiting controlling terminal includes processor 1001, can also include input interface 1002, output interface 1003 and memory 1004.This is defeated It is connected with each other between incoming interface 1002, output interface 1003, memory 1004 and processor 1001 by bus.
Memory include but is not limited to be random access memory (random access memory, RAM), read-only storage Device (read-only memory, ROM), Erasable Programmable Read Only Memory EPROM (erasable programmable read Only memory, EPROM) or portable read-only memory (compact disc read-only memory, CD-ROM), The memory is used for dependent instruction and data.
Input interface is used for output data and/or signal for input data and/or signal and output interface.Output Interface and input interface can be independent device, be also possible to the device of an entirety.In the embodiment of the present application, which is connect Mouth can also include call option etc..
Processor may include be one or more processors, for example including one or more central processing unit (central Processing unit, CPU), in the case where processor is a CPU, which can be monokaryon CPU, be also possible to more Core CPU.
Memory is used to store the program code and data of access control terminal.In the embodiment of the present application, which can For storing the facial image of the user in target area.Optionally, which can also be used in the passage for storing target user Record etc..
Processor is used to call the program code and data in the memory, executes the step in above method embodiment.
As in one embodiment, processor can be used for executing 301 to 303 shown in implementation;For another example processor is also Implementation shown in can be used for executing 401 to 404 etc..Optionally, processor can also be used to control output interface to gate inhibition Device sends the first control instruction.
For another example in one embodiment, processor can also be used to execute acquiring unit 601, image authentication unit 602 and refer to Enable method shown in processing unit 603 etc..
Description in embodiment of the method can be found in for the specific implementation of processor and/or input/output interface, This is repeated no more.
It is designed it is understood that Figure 10 illustrate only simplifying for access control terminal.In practical applications, gate inhibition is controlled Terminal processed can also separately include necessary other elements, including but not limited to any number of input/output interface, processing Device, controller, memory etc., and all access control terminals that the embodiment of the present application may be implemented are all in the protection model of the application Within enclosing.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, the process Relevant hardware can be instructed to complete by computer program, which can be stored in computer-readable storage medium, should Program is when being executed, it may include such as the process of above-mentioned each method embodiment.And storage medium above-mentioned includes: ROM or deposits at random Store up the medium of the various program storage codes such as memory body RAM, magnetic or disk.

Claims (10)

1. a kind of access control management method, the method is applied to access control system, and the access control system includes gate inhibition's control Terminal processed and entrance guard device, which is characterized in that the described method includes:
The access control terminal obtains target facial image;Wherein, the target facial image is the face figure of target user Picture, the target user are the user to be determined for whether allowing access into target area;
The access control terminal verifies the target facial image, obtains verification result;
The attribute that the target user is obtained according to the verification result obtains control according to the attribute of the target user and refers to Enable, wherein the control instruction include the first control instruction, first control instruction for be sent to the entrance guard device with Control the entrance guard device.
2. the method according to claim 1, wherein described obtain the target user according to the verification result Attribute, the first control instruction is obtained according to the attribute of the target user, and first control instruction is sent to described Entrance guard device is to control the entrance guard device, comprising:
It is to determine that the target user is white list user, wherein institute in the case where being proved to be successful in response to the verification result State the permanent resident population that white list user includes: the target area;
The case where in response to permanent resident population that the target user is the target area, first control instruction is obtained, and First control instruction is sent to the entrance guard device to control the entrance guard device and open.
3. according to the method described in claim 2, it is characterized in that, described be sent to the gate inhibition for first control instruction After device is to control the entrance guard device unlatching, the method also includes:
The access control terminal determines the smart home device that the target user uses;
The access control terminal sends open command to the smart home device;Wherein, the open command is used to indicate Open the smart home device.
4. according to the method in claim 2 or 3, which is characterized in that in the case where the verification result is to be proved to be successful, The method also includes:
The access control terminal generates the current record of the target user, wherein the current record include transit time, Current at least one of address and the target facial image;
The current record is uploaded to Cloud Server by the access control terminal.
5. the method according to claim 1, wherein described obtain the target user according to the verification result Attribute, the first control instruction is obtained according to the attribute of the target user, and first control instruction is sent to described Entrance guard device is to control the entrance guard device, comprising:
In the case where being authentication failed in response to the verification result, judge whether the target user is black list user;
In the case where being judged as NO, first control instruction is obtained according to the feedback information of the first user terminal, and by institute It states the first control instruction and is sent to the entrance guard device to control the entrance guard device.
6. described according to the method described in claim 5, it is characterized in that, the control instruction further includes the first prompt information Method further include:
In the case where being judged as YES, the access control terminal sends first prompt information and gives second user terminal.
7. a kind of access control terminal characterized by comprising
Acquiring unit, for obtaining target facial image;Wherein, the target facial image is the facial image of target user, The target user is the user to be determined for whether allowing access into target area;
Image authentication unit obtains verification result for verifying to the target facial image;
Instruction process unit, for obtaining the attribute of the target user according to the verification result, and according to the target The attribute of user obtains control instruction, wherein the control instruction includes the first control instruction, and first control instruction is used for The entrance guard device is sent to control the entrance guard device.
8. a kind of access control terminal, which is characterized in that including processor and memory, the processor and the memory connect It connects, computer-readable instruction is stored in the memory, when the computer-readable instruction is executed by the processor, make institute It states processor and executes as the method according to claim 1 to 6.
9. a kind of access control system characterized by comprising access control terminal and entrance guard device;Wherein,
The access control terminal verifies the target facial image for obtaining target facial image, obtains verifying As a result, and the attribute of the target user is obtained according to the verification result, obtained and controlled according to the attribute of the target user System instruction, wherein the control instruction includes the first control instruction, and first control instruction is for being sent to gate inhibition's dress It sets to control the entrance guard device;Wherein, the target facial image is the facial image of target user, and the target user is The user to be determined for whether allowing access into target area;
The entrance guard device for receiving the first control instruction from the access control terminal, and controls gate inhibition's dress It sets.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium Readable instruction, the computer-readable instruction when being executed by a processor, make the processor perform claim require any one of 1-6 The method.
CN201811395117.9A 2018-11-21 2018-11-21 Access control management method and access control terminal, system Pending CN109544748A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811395117.9A CN109544748A (en) 2018-11-21 2018-11-21 Access control management method and access control terminal, system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811395117.9A CN109544748A (en) 2018-11-21 2018-11-21 Access control management method and access control terminal, system

Publications (1)

Publication Number Publication Date
CN109544748A true CN109544748A (en) 2019-03-29

Family

ID=65849112

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811395117.9A Pending CN109544748A (en) 2018-11-21 2018-11-21 Access control management method and access control terminal, system

Country Status (1)

Country Link
CN (1) CN109544748A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110706387A (en) * 2019-10-25 2020-01-17 北京首钢自动化信息技术有限公司 Access control method and device
CN111125409A (en) * 2019-12-04 2020-05-08 浙江大华技术股份有限公司 Control method and device of access control system and access control system
CN111554025A (en) * 2020-04-26 2020-08-18 云知声智能科技股份有限公司 Passing method, device and system
CN112767581A (en) * 2020-12-31 2021-05-07 一生一石珠宝股份有限公司 Intelligent door lock unlocking method and system based on intelligent bracelet and storage medium
CN112907809A (en) * 2021-01-29 2021-06-04 深圳市兴海物联科技有限公司 Management method, system, equipment and computer storage medium
CN113361327A (en) * 2021-04-30 2021-09-07 福建榕融芯微电子科技有限公司 Campus access management system and edge computing device suitable for same
CN113810157A (en) * 2021-09-13 2021-12-17 上海偕云信息技术有限公司 RS485 protocol-based access control data transmission processing method and system
CN113955600A (en) * 2021-11-12 2022-01-21 深圳云天励飞技术股份有限公司 Non-motor vehicle monitoring method, elevator monitoring system and storage medium
CN114039786A (en) * 2021-11-12 2022-02-11 浩云科技股份有限公司 Authority verification system, equipment and computer medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103295294A (en) * 2013-04-22 2013-09-11 大连智慧城科技有限公司 Indoor unit-free access control system based on SIP
CN104361664A (en) * 2014-11-10 2015-02-18 生迪光电科技股份有限公司 LED (Lighting Emitting Diode) lighting equipment and system and control method thereof
CN204423460U (en) * 2014-12-12 2015-06-24 北京中研众力科技有限公司 There is the recognition of face access control equipment of advertising message media function
CN104751553A (en) * 2015-04-03 2015-07-01 厦门狄耐克电子科技有限公司 Passive optical network (PON)-based visible intercom access control system of intelligent community
CN105761339A (en) * 2016-01-29 2016-07-13 成都比善科技开发有限公司 Community access control system and method
CN106652118A (en) * 2016-10-20 2017-05-10 福建省家联宝智能科技有限公司 Door control system without indoor machine
CN106887062A (en) * 2017-02-13 2017-06-23 合肥美信息科技有限公司 Recognition of face advertisement gate inhibition's main frame based on high in the clouds
KR20170082873A (en) * 2016-01-07 2017-07-17 주식회사 얍컴퍼니 Apparatus for controlling wireless communication of a speed gate and method for controlling gate using the same
CN107665530A (en) * 2017-09-26 2018-02-06 四川仪岛科技有限公司 A kind of face identification unit gate control system and control method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103295294A (en) * 2013-04-22 2013-09-11 大连智慧城科技有限公司 Indoor unit-free access control system based on SIP
CN104361664A (en) * 2014-11-10 2015-02-18 生迪光电科技股份有限公司 LED (Lighting Emitting Diode) lighting equipment and system and control method thereof
CN204423460U (en) * 2014-12-12 2015-06-24 北京中研众力科技有限公司 There is the recognition of face access control equipment of advertising message media function
CN104751553A (en) * 2015-04-03 2015-07-01 厦门狄耐克电子科技有限公司 Passive optical network (PON)-based visible intercom access control system of intelligent community
KR20170082873A (en) * 2016-01-07 2017-07-17 주식회사 얍컴퍼니 Apparatus for controlling wireless communication of a speed gate and method for controlling gate using the same
CN105761339A (en) * 2016-01-29 2016-07-13 成都比善科技开发有限公司 Community access control system and method
CN106652118A (en) * 2016-10-20 2017-05-10 福建省家联宝智能科技有限公司 Door control system without indoor machine
CN106887062A (en) * 2017-02-13 2017-06-23 合肥美信息科技有限公司 Recognition of face advertisement gate inhibition's main frame based on high in the clouds
CN107665530A (en) * 2017-09-26 2018-02-06 四川仪岛科技有限公司 A kind of face identification unit gate control system and control method

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110706387A (en) * 2019-10-25 2020-01-17 北京首钢自动化信息技术有限公司 Access control method and device
CN111125409A (en) * 2019-12-04 2020-05-08 浙江大华技术股份有限公司 Control method and device of access control system and access control system
CN111125409B (en) * 2019-12-04 2023-07-14 浙江大华技术股份有限公司 Control method and device of access control system and access control system
CN111554025A (en) * 2020-04-26 2020-08-18 云知声智能科技股份有限公司 Passing method, device and system
CN112767581A (en) * 2020-12-31 2021-05-07 一生一石珠宝股份有限公司 Intelligent door lock unlocking method and system based on intelligent bracelet and storage medium
CN112907809A (en) * 2021-01-29 2021-06-04 深圳市兴海物联科技有限公司 Management method, system, equipment and computer storage medium
CN113361327A (en) * 2021-04-30 2021-09-07 福建榕融芯微电子科技有限公司 Campus access management system and edge computing device suitable for same
CN113810157A (en) * 2021-09-13 2021-12-17 上海偕云信息技术有限公司 RS485 protocol-based access control data transmission processing method and system
CN113955600A (en) * 2021-11-12 2022-01-21 深圳云天励飞技术股份有限公司 Non-motor vehicle monitoring method, elevator monitoring system and storage medium
CN114039786A (en) * 2021-11-12 2022-02-11 浩云科技股份有限公司 Authority verification system, equipment and computer medium

Similar Documents

Publication Publication Date Title
CN109544748A (en) Access control management method and access control terminal, system
US11887420B2 (en) Electronic access control and location tracking system
CN107492168B (en) A kind of access control system of residential community and door opening method based on cloud service
US9424699B2 (en) Electronic access control and location tracking system
CN105976471B (en) A kind of access control equipment, caller management method and system
CN106056707A (en) Residential quarter network access control scheme
CN105741395A (en) Entrance guard access method and system based on two-dimension code and face identification
CN107507305A (en) A kind of access control system of residential community and door opening method based on wechat
CN107705394B (en) WeChat platform-based community access control door opening method and system
CN113053013B (en) Access control method and device based on face recognition, computer equipment and medium
CN106897959A (en) A kind of intelligent Community safety-protection system based on Internet of Things
CN106302547A (en) Type hotel occupancy management system and method
CN110494898A (en) With wireless and face recognition entrance monitoring system
MX2013011116A (en) Distribution of premises access information.
CN110494897A (en) Enter monitoring system with wireless and face recognition visitor
CN108946348A (en) A kind of elevator control method based on recognition of face
CN110491008A (en) A kind of community-based managing caller side and system, storage medium
CN111373453A (en) Entrance monitoring system with radio and face recognition mechanism
CN105913529B (en) A kind of the unlocking control method and system of networked door access control
CN108198309A (en) The safety check traffic system and identification verification method veritified based on IMSI number
CN210795408U (en) Take advantage of terraced system based on cell-phone bluetooth communication
CN105678869A (en) Entrance guard intelligent controller, entrance guard intelligent control system and entrance guard opening method thereof
CN107055235A (en) The elevator intelligent control method and system of the outer visitor of a kind of reply
US20220222995A1 (en) System for analyzing and attesting physical access
CN116912041A (en) Entrance management method based on network house-making and civil-hosting

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190329