CN109785484A - A kind of security image mobile terminal apparatus and working method - Google Patents
A kind of security image mobile terminal apparatus and working method Download PDFInfo
- Publication number
- CN109785484A CN109785484A CN201811636516.XA CN201811636516A CN109785484A CN 109785484 A CN109785484 A CN 109785484A CN 201811636516 A CN201811636516 A CN 201811636516A CN 109785484 A CN109785484 A CN 109785484A
- Authority
- CN
- China
- Prior art keywords
- visitor
- intelligent chip
- mobile terminal
- identity
- perimeter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Alarm Systems (AREA)
Abstract
The present invention relates to a kind of security image mobile terminal apparatus and working methods, belong to safety and protection monitoring systems technology field, and device includes intelligent chip and power supply module, and intelligent chip is connected with monitor terminal, identity recognition terminal;Monitor terminal is far infrared camera, for capturing the figure image of visitor;Identity recognition terminal is used to receive the identity information of visitor and identity information is passed to intelligent chip to differentiate;Power supply module is for providing electric power.Security image mobile terminal apparatus is connected by intelligent chip with the switch of perimeter limits device.It further include display screen and operation button, for when the connection of intelligent chip and perimeter limits device switch is broken down or when needing to increase artificial authentication, manipulating the open and close of perimeter limits device, realizing allowing access into or being rejected for entry into visitor.Flexible operation is practical, safety and stability, and criminal is effectively prevent to pretend to be visitor, guarantees the reliability of security effect.
Description
Technical field
The present invention relates to a kind of security image mobile terminal apparatus and working methods, belong to safety and protection monitoring systems technology neck
Domain.
Background technique
In the daily inspection management process of security entrance guard, generallys use paper record single pair inspection result and recorded, deposited
In property easy to be lost, randomness and not tractability, some carefree Security Personnel even can be under the premise of not patrolling arbitrarily
A suspect is allowed to enter company, there are loopholes for security.
Summary of the invention
In view of the deficiencies of the prior art, in order to reinforce entrance guard's safety management of company, and to security personnel's work on duty
Management, the present invention provide a kind of security image mobile terminal apparatus, and the present invention also provides the working methods of above-mentioned apparatus.Using body
Part identification terminal verifies the identity of visiting personnel, high reliablity, and imaging results are carried out in a manner of electronic data
It saves, is conducive to the preservation of inspection result and searching and managing of tracing to the source, prevents security loophole.
Technical scheme is as follows:
A kind of security image mobile terminal apparatus, including intelligent chip and power supply module, intelligent chip are whole with monitoring respectively
End, identity recognition terminal are connected;Monitor terminal is far infrared camera, for capturing the figure image of visitor;Identification
Terminal is used to receive the identity information of visitor and identity information is passed to intelligent chip to differentiate;
Power supply module is connected with intelligent chip, and power supply module is used to provide electric power to device;
Security image mobile terminal apparatus is connected by intelligent chip with the switch of perimeter limits device.Intelligent chip
The open and close of perimeter limits device can be manipulated after authentication automatically, realize and allow access into visitor by having passed through
Or it is rejected for entry into.
Preferred according to the present invention, device further includes display screen, and display screen is connected with intelligent chip, and display screen is for showing
Operating process interface, the verification result of intelligent chip and visitor image data.
It is further preferred that security image mobile terminal apparatus further includes operation button, operation button and intelligent chip phase
Even, operation button carries out the open and close of perimeter limits device for independent control intelligent chip.
Preferred according to the present invention, intelligent chip is connected by RS-458 communication interface and inspection data center server data
It connects.
Preferred according to the present invention, identity recognition terminal is finger-print recognising instrument, between radio frequency identification instrument, password identification instrument
It is one or more.User can be verified by single fingerprint, ID card, password or various ways combination accesses and tests
Card.
A kind of working method of above-mentioned security image mobile terminal apparatus, comprises the following steps that
S1, visitor come at the limits device of perimeter, and visitor passes through identity recognition terminal, input visiting people
Identity information is passed to intelligent chip by the identity information of member, identity recognition terminal, and intelligent chip starts to verify visitor's
Identity;Meanwhile monitor terminal shoots and records the image of visitor while influencing visitor to be transferred to intelligent chip;
After S2, authentication pass through, mobile terminal automatically opens perimeter limits device, verifies when record starts at this time
Time T1;
S3, visitor terminate to access, and are come at the limits device of perimeter again, input the identity letter of visitor
Breath, by the identity of intelligent chip verifying visitor, while monitor terminal shoots and records the image of visitor again, verifying
After identity information, perimeter limits device is automatically opened, and record verification time T2 when exiting;
Preferred according to the present invention, step further includes S4, and the record result generated is passed through RS-458 communication interface
It transmits and saves to inspection data center server, the record result includes verification time T1 at the beginning of visitor, moves back
The image data of verification time T2 and front and back visitor twice when out.
It is preferred according to the present invention, in S2, when the connection that intelligent chip is switched with perimeter limits device is broken down
When, or when needing to increase artificial authentication, perimeter limits device can not directly be opened by intelligent chip, at this time intelligent core
After piece verifying identity passes through, intelligent chip by the result of authentication and visitor's image transmission to display screen, by the people that works
Member determines whether that visitor is allowed to enter, if allowing, staff controls intelligent chip by operation button and opens outside area
Domain limits device switch;If not allowing, limits device switch in perimeter is not turned on.Can successfully manage equipment fault and
Promote security dynamics.
The beneficial effects of the present invention are:
The security image mobile terminal apparatus that the present invention designs is used to carry out visiting personnel effective confirmation to verify management,
Security personnel is promoted to carry out safety verification to every department and office visitor by corporate security management method by this set system, to avoid stealing
It steals and noisy visit accident occurs and solves in time, this inspection mode can greatly reinforce the safeguarding work of company, to security personnel's value
The inspection work of class member carries out effective supervision and management.
The device of the invention function is reliable, and flexible and convenient operation is practical, and safety and stability, data are accurate, effect is aobvious
It writes, is suitble to the wide popularization and application in security system.Visitor carries out authentication in visiting, and identity knowledge can be improved
Other reliability prevents criminal from pretending to be visitor, guarantees the reliability of security effect.
Detailed description of the invention
Fig. 1 is terminal installation component connection schematic diagram of the invention.
Specific embodiment
The present invention will be further described by way of example and in conjunction with the accompanying drawings, but not limited to this.
Embodiment 1:
A kind of security image mobile terminal apparatus, including intelligent chip and power supply module, intelligent chip are whole with monitoring respectively
End, identity recognition terminal are connected;Monitor terminal is far infrared camera, for capturing the figure image of visitor;Identification
Terminal is used to receive the identity information of visitor and identity information is passed to intelligent chip to differentiate.Power supply module and intelligence
Chip is connected, and power supply module is used to provide electric power to device.Based on the optional MOTOROLA company MC68HC908GP32 of intelligent chip
Control chip.
Security image mobile terminal apparatus is connected by intelligent chip with the switch of perimeter limits device.Intelligent chip
The open and close of perimeter limits device can be manipulated after authentication automatically, realize and allow access into visitor by having passed through
Or it is rejected for entry into.Identity recognition terminal is existing finger-print recognising instrument, radio frequency identification instrument, one kind or more between password identification instrument
Kind.User can be verified by single fingerprint, ID card, password or various ways combination is combined verifying.
Embodiment 2:
A kind of security image mobile terminal apparatus, structure is as described in Example 1, the difference is that device further includes showing
Display screen, display screen are connected with intelligent chip, and display screen is for display operation process interface, the verification result and visiting of intelligent chip
The image data of personnel.
Security image mobile terminal apparatus further includes operation button, and operation button is connected with intelligent chip, and operation button is used
The open and close of perimeter limits device are carried out in independent control intelligent chip.
Embodiment 3:
A kind of security image mobile terminal apparatus, structure is as described in Example 2, the difference is that intelligent chip passes through
RS-458 communication interface and inspection data center server data connection.
Embodiment 4:
A kind of working method of security image mobile terminal apparatus as described in Example 3, comprises the following steps that
S1, visitor come at the limits device of perimeter, and visitor passes through identity recognition terminal, input visiting people
Identity information is passed to intelligent chip by the identity information of member, identity recognition terminal, and intelligent chip starts to verify visitor's
Identity;Meanwhile monitor terminal shoots and records the image of visitor while influencing visitor to be transferred to intelligent chip;
After S2, authentication pass through, mobile terminal automatically opens perimeter limits device, verifies when record starts at this time
Time T1;
S3, visitor terminate to access, and are come at the limits device of perimeter again, input the identity letter of visitor
Breath, by the identity of intelligent chip verifying visitor, while monitor terminal shoots and records the image of visitor again, verifying
After identity information, perimeter limits device is automatically opened, and record verification time T2 when exiting;
S4, the record result generated is transmitted by RS-458 communication interface and is saved to inspection data center services
Device, verification time T2 and front and back are arrived twice when the record result includes verification time T1 at the beginning of visitor, exits
The image data of visit personnel.
Embodiment 5:
A kind of working method as described in Example 4, the difference is that according to actual needs, being tested automatically in terminal installation
Increase artificial secondary verifying on the basis of card, verification result and the monitoring of intelligent chip can be read using display screen by staff
Visitor's image of terminal shooting manually decides whether that opening perimeter limits on the basis of intelligent chip verifying
Device.In S2, perimeter limits device can not directly be opened by intelligent chip, after intelligent chip verifying identity passes through at this time,
The result of authentication and visitor's image transmission to display screen, are determined whether to allow to visit by intelligent chip by staff
Personnel enter, if allowing, staff controls intelligent chip by operation button and opens perimeter limits device switch;If no
Allow, limits device switch in perimeter is not turned on.Equipment fault can be successfully managed and promote security dynamics.
Claims (8)
1. a kind of security image mobile terminal apparatus, which is characterized in that including intelligent chip and power supply module, intelligent chip difference
It is connected in monitor terminal, identity recognition terminal;Monitor terminal is far infrared camera, for capturing the figure image of visitor;
Identity recognition terminal is used to receive the identity information of visitor and identity information is passed to intelligent chip to differentiate;
Power supply module is connected with intelligent chip, and power supply module is used to provide electric power to device;
Security image mobile terminal apparatus is connected by intelligent chip with the switch of perimeter limits device.
2. security image mobile terminal apparatus according to claim 1, which is characterized in that device further includes display screen, is shown
Display screen is connected with intelligent chip, and display screen is for display operation process interface, the verification result of intelligent chip and visitor
Image data.
3. security image mobile terminal apparatus according to claim 2, which is characterized in that security image mobile terminal apparatus
It further include operation button, operation button is connected with intelligent chip, and operation button carries out outside area for independent control intelligent chip
The open and close of domain limits device.
4. security image mobile terminal apparatus according to claim 3, which is characterized in that intelligent chip is logical by RS-458
Communication interface and inspection data center server data connection.
5. security image mobile terminal apparatus according to claim 1, which is characterized in that identity recognition terminal is fingerprint knowledge
It is other instrument, radio frequency identification instrument, one or more between password identification instrument.
6. a kind of working method of security image mobile terminal apparatus as claimed in claim 4, comprises the following steps that
S1, visitor come at the limits device of perimeter, and visitor inputs visitor's by identity recognition terminal
Identity information is passed to intelligent chip by identity information, identity recognition terminal, and intelligent chip starts to verify the identity of visitor;
Meanwhile monitor terminal shoots and records the image of visitor while influencing visitor to be transferred to intelligent chip;
After S2, authentication pass through, mobile terminal automatically opens perimeter limits device, verification time when record starts at this time
T1;
S3, visitor terminate to access, and are come at the limits device of perimeter again, input the identity information of visitor, by
Intelligent chip verifies the identity of visitor, while monitor terminal shoots and records the image of visitor again, verifies identity
After information, perimeter limits device is automatically opened, and record verification time T2 when exiting.
7. working method according to claim 6, which is characterized in that step further includes S4, the record knot that will have been generated
Fruit is transmitted by RS-458 communication interface and is saved to inspection data center server, and the record result includes visitor's
Verification time T1 when beginning, when exiting verification time T2 and front and back visitor twice image data.
8. working method according to claim 7, which is characterized in that in S2, when intelligent chip and perimeter limitation fill
When setting the connection of switch and breaking down, or when needing to increase artificial authentication, outside area can not directly be opened by intelligent chip
Domain limits device, after intelligent chip verifying identity passes through at this time, intelligent chip is by the result of authentication and visitor's image
It is transferred to display screen, is determined whether that visitor is allowed to enter by staff, if allowing, staff passes through operation button control
Intelligent chip processed opens perimeter limits device switch;If not allowing, limits device switch in perimeter is not turned on.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811636516.XA CN109785484A (en) | 2018-12-29 | 2018-12-29 | A kind of security image mobile terminal apparatus and working method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811636516.XA CN109785484A (en) | 2018-12-29 | 2018-12-29 | A kind of security image mobile terminal apparatus and working method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109785484A true CN109785484A (en) | 2019-05-21 |
Family
ID=66498909
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811636516.XA Pending CN109785484A (en) | 2018-12-29 | 2018-12-29 | A kind of security image mobile terminal apparatus and working method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109785484A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101216960A (en) * | 2008-01-11 | 2008-07-09 | 李天� | An electronic guard defense system and method |
CN101894406A (en) * | 2010-08-09 | 2010-11-24 | 惠州市华阳多媒体电子有限公司 | Network access control system |
CN103810773A (en) * | 2012-11-07 | 2014-05-21 | 深圳市中联创新自控系统有限公司 | Visitor centralized management system and method |
CN107845179A (en) * | 2017-12-25 | 2018-03-27 | 厦门大学嘉庚学院 | A kind of Campus visitor management system and method |
CN109035539A (en) * | 2018-10-30 | 2018-12-18 | 四川洪诚电气科技有限公司 | access control system |
-
2018
- 2018-12-29 CN CN201811636516.XA patent/CN109785484A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101216960A (en) * | 2008-01-11 | 2008-07-09 | 李天� | An electronic guard defense system and method |
CN101894406A (en) * | 2010-08-09 | 2010-11-24 | 惠州市华阳多媒体电子有限公司 | Network access control system |
CN103810773A (en) * | 2012-11-07 | 2014-05-21 | 深圳市中联创新自控系统有限公司 | Visitor centralized management system and method |
CN107845179A (en) * | 2017-12-25 | 2018-03-27 | 厦门大学嘉庚学院 | A kind of Campus visitor management system and method |
CN109035539A (en) * | 2018-10-30 | 2018-12-18 | 四川洪诚电气科技有限公司 | access control system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107578519A (en) | A kind of intelligent access control system and intelligent entrance guard method for unlocking | |
CN107665530A (en) | A kind of face identification unit gate control system and control method | |
CN107730672A (en) | A kind of face identification unit gate control system and control method | |
CN106934885A (en) | Smart lock and remote unlocking method | |
CN109993863A (en) | A kind of access control system and its control method based on recognition of face | |
KR102243963B1 (en) | System for managing attendance using face recognition | |
CN105893823A (en) | Security protection method and device, and intelligent terminal | |
CN207267773U (en) | Elevator for intelligent building | |
KR20110007455A (en) | Entrance control system comprising camera and control method thereof | |
CN107293024A (en) | A kind of kindergarten based on recognition of face is far from garden management system and method | |
CN108257266A (en) | A kind of multi-functional smart lock | |
CN105913513A (en) | Control method and system for door lock system | |
CN105320865A (en) | Authentication method, collection device, authentication device and system, equipment cabinet and unlocking method | |
CN207764866U (en) | intelligent access control system | |
CN106558129A (en) | The intelligent entrance guard and attendance checking system of short-distance wireless communication and control method | |
CN103791686A (en) | Intelligent refrigerator with iris recognition function | |
CN109409057A (en) | Security system and its control method, control device and storage medium | |
CN109461241A (en) | A kind of face and fingerprint identification entrance guard system control method | |
CN108764061A (en) | A kind of user authen method and device with monitoring and safety warning function | |
CN107730697A (en) | The guard method of identification can be carried out | |
CN207397360U (en) | A kind of access control system for realizing people stream counting control | |
CN109493475A (en) | A method of based on biological characteristic as fence | |
CN108986288A (en) | A kind of two-door access control system of the laboratory based on recognition of face and speech recognition | |
CN109035534A (en) | A kind of gate inhibition's monitoring method, controller and system | |
CN211015753U (en) | Face recognition security system based on Internet of things |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190521 |
|
RJ01 | Rejection of invention patent application after publication |