CN110009543A - Based on artificial intelligence community access control management method and device and system and storage medium - Google Patents

Based on artificial intelligence community access control management method and device and system and storage medium Download PDF

Info

Publication number
CN110009543A
CN110009543A CN201910263214.0A CN201910263214A CN110009543A CN 110009543 A CN110009543 A CN 110009543A CN 201910263214 A CN201910263214 A CN 201910263214A CN 110009543 A CN110009543 A CN 110009543A
Authority
CN
China
Prior art keywords
personnel
record
community
access
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910263214.0A
Other languages
Chinese (zh)
Inventor
王益
高建伦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Everything Cloud Technology Co Ltd
Original Assignee
Shenzhen Everything Cloud Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Everything Cloud Technology Co Ltd filed Critical Shenzhen Everything Cloud Technology Co Ltd
Priority to CN201910263214.0A priority Critical patent/CN110009543A/en
Publication of CN110009543A publication Critical patent/CN110009543A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Abstract

The invention discloses one kind based on artificial intelligence community access control management method and device and system and storage medium, the following steps are included: step S1, community personnel information is acquired, distributes corresponding authority according to community personnel information, and in the database by the storage of community personnel information;Step S2 obtains access personal information by artificial intelligence equipment, and access personal information and community personnel information is compared judgement, obtains judging result;Step S3 executes green operation according to judging result artificial intelligence equipment or warning operates;The community personnel information includes owner, family members, tenant, visitor, staff, outsourcing service provider, blacklist, stranger;The community personnel information is stored separately according to each personnel's type, each personnel's type of the community personnel information is corresponding with the community personnel of multiple the type;The step S3 further includes data characteristics analysis, obtains daily discrepancy peak period to access personal information analysis and enters and leaves trough period.

Description

Based on artificial intelligence community access control management method and device and system and storage medium
Technical field
The present invention relates to entrance guard management technical field, more particularly to it is a kind of based on artificial intelligence community access control management method and Device and system and storage medium.
Background technique
Community is the basic unit for carrying social population, is the important agent of urban development.But due to many reasons, There is also various problems, such as technology and product to lack open, compatibility and interconnectivity, unified technical standard in the building of communities It is not yet formed, product function is single, does not have perceptional function etc., and especially important place is, many community gate inhibitions take people The phenomenon that work is let pass or cell phone software automatic door opening, owner and lessee are entered to reside on simply without audit, therefore there are many peaces Full hidden danger.Current community service cannot achieve comprehensive Intelligent gate control, for the intelligent management method of gate inhibition's processing Do not occur yet.
Technology of Internet of things based on artificial intelligence be able to solve current community's access control there are the problem of, be community it is complete Face intelligent development provides technical support.But also lack systematic about community's entrance guard management based on artificial intelligence at present Method is used to study and instruct the all-round construction of modernization community's access control system.
It is currently, there are and largely combines community's access control applications of artificial intelligence technology also in scheme or trial operation stage, The excavation of community's access control applications demand is also insufficient, and traditional access control system how is transformed, to set up accurate and intelligentized control method Access control system becomes a problem in the urgent need to address.
The invention proposes one kind based on artificial intelligence community access control management method and device and system for these reasons And storage medium, it is intended to solve the problems, such as above-mentioned, and be also used to improve experience of the resident for community gate inhibition.
Summary of the invention
In order to meet above-mentioned requirements, it is an object of the present invention to provide one kind to be based on the entrance guard management of artificial intelligence community Method, this method can flexibly and effectively solve that low efficiency existing for current access control system, there are the brings such as security risk Adverse effect, reduces the artificial participation step of manager, improves user experience, increase the safety coefficient of community gate inhibition.
Second object of the present invention is to propose a kind of community's entrance guard device based on artificial intelligence, for realizing above-mentioned Based on artificial intelligence community access control management method, the purpose of this method is realized.
It is a kind of based on artificial intelligence community access control system it is another object of the present invention to propose, it is able to achieve above-mentioned be based on Artificial intelligence community access control management method reaches the same effect of this method.
Fourth object of the present invention is to propose a kind of non-transitorycomputer readable storage medium, is stored thereon with meter Calculation machine program.
To achieve the goals above, the invention adopts the following technical scheme:
A kind of community's access control management method based on artificial intelligence, comprising the following steps:
Step S1 acquires community personnel information, and in the database by the storage of community personnel information;
Step S2 obtains access personal information by artificial intelligence equipment, and access personal information is believed with community personnel Breath compares judgement, obtains judging result;
Step S3 executes green operation according to judging result artificial intelligence equipment or warning operates;
The community personnel information includes owner, family members, tenant, visitor, staff, outsourcing service provider, blacklist, strange People;The community personnel information is stored separately according to each personnel's type, each personnel's type of the community personnel information It is corresponding with the community personnel of multiple the type;
The step S3 further includes data characteristics analysis, by obtaining daily discrepancy peak to access personal information analysis Phase and discrepancy trough period;And the crucial geographical location for being also easy to produce conflict is obtained, and provide early warning for crucial geographical location.
Further technical solution is, the step S2 further includes entering for owner or the following sub-step of personnel's registration:
Sub-step Q1 judges whether access personnel are owner;
Sub-step Q2 judges whether access personnel are owner family members;
Sub-step Q3 judges whether access personnel are lessee;
Sub-step Q4 judges whether access personnel are staff;
Sub-step Q5 judges whether access personnel are outsourcing service provider;
Sub-step Q6 judges that access personnel whether there is in blacklist;
Sub-step Q7 judges whether access personnel are visitor;
The access personnel are sentenced by sub-step Q1, sub-step Q2, sub-step Q3, sub-step Q4, sub-step Q5, sub-step Q7 It is disconnected when belonging to community personnel, green operation is executed, right of access is given;
Wherein, when the access personnel are not belonging to above-mentioned sub-step Q1, sub-step Q2, sub-step Q3, sub-step Q4, sub-step When the personnel of any one of rapid Q5, sub-step Q7, artificial intelligence equipment judge the access personnel for blacklist or stranger, at this time Execute the warning operation.
Further technical solution is that the sub-step Q1 further includes, when the access personnel are owner, judging database In whether have the record of owner of the owner;
Record of owner if it exists then executes and does not update operation;
Record of owner if it does not exist then continues to judge whether have other records in database;If having other records, The operation for being changed to record of owner is executed, if increasing the operation of record of owner in database executing without other records.
Further technical solution is that the sub-step Q2 further includes, when the access personnel are owner family members, judging number According to whether having corresponding record of owner in library;
Corresponding record of owner if it exists then executes and judges whether there is family members' record in corresponding record of owner in database;If No family members' record, then execute and execute if there is family members' record in the operation that database increases family members' record and do not update operation;
Corresponding record of owner if it does not exist then executes owner's confirmation operation;If owner is confirmed as family members, execute in data Increase record of owner in library to operate and increase family members' record, if owner confirms non-family members, executes the operation not updated, and/ Or, executing warning operation.
Further technical solution is that the sub-step Q3 further includes, when the access personnel are lessee, judging database In whether the existing corresponding corresponding record of owner of lessee's information;
Corresponding record of owner if it exists then executes and judges whether there is lessee's record in database;If no lessee's record, holds Row executes if there is lessee's record in the operation that database increases lessee's record and does not update operation;
Corresponding record of owner if it does not exist then executes owner's confirmation operation;If owner is confirmed as lessee, execute in data Increase record of owner in library to operate and increase lessee's record, if owner confirms non-lessee, executes the operation not updated, and/ Or, executing warning operation.
Further technical solution is that the sub-step Q4 further includes, when the access personnel are staff, judging number According in library, whether existing staff is recorded;
Staff records if it exists, then executes the operation not updated;
Staff records if it does not exist, then executes other notes whether judgement has the access personnel in the database Record;Other are recorded if it exists, then execute other record records of access personnel described in database being changed to staff's note Record, other are recorded if it does not exist, then execute and record the staff for increasing the access personnel in database.
Further technical solution is that the sub-step Q5 further includes, when the access personnel are outsourcing service provider, judging number According in library, whether existing outsourcing service provider is recorded;
Outsourcing service provider records if it exists, then executes the operation not updated;
Outsourcing service provider records if it does not exist, then executes other notes whether judgement has the access personnel in the database Record;Other are recorded if it exists, then execute other record records of access personnel described in database being changed to outsourcing service provider's note Record, other are recorded if it does not exist, then execute and record the outsourcing service provider for increasing the access personnel in database.
Further technical solution is that the sub-step Q6 further includes, when judging that the access personnel belong to blacklist, Judge whether existing blacklist records in database;
Blacklist records if it exists, then executes and judge whether blacklist mechanism of deploying to ensure effective monitoring and control of illegal activities is identical;If mechanism of deploying to ensure effective monitoring and control of illegal activities is identical, hold The capable operation not updated, and/or, warning operation is executed, if mechanism of deploying to ensure effective monitoring and control of illegal activities is not identical, executes and updates blacklist and deploy to ensure effective monitoring and control of illegal activities information Operation;
Blacklist records if it does not exist, then executes other records whether judgement has the access personnel in the database; Other are recorded if it exists, then the other information of the access personnel are added to black list information and alarmed, and/or, execute police Accuse operation;Other are recorded if it does not exist, then execute the operation for increasing blacklist record in the database, and set rule of deploying to ensure effective monitoring and control of illegal activities.
Further technical solution is that the sub-step Q7 further includes, when judging that the access personnel belong to visitor, sentencing Whether existing visitor records in disconnected database;
Visitor records if it exists, then executes and judge whether visiting time is consistent;If visiting time is consistent, executes and do not update Operation, if access time is not identical, execute in the database increase visitor record operation;
Visitor records if it does not exist, then executes other records whether judgement has the access personnel in the database;If There are other records, then execute the operation not updated;Other are recorded if it does not exist, then execute and increase visitor's note in the database Record.
The invention also discloses a kind of community's entrance guard device based on artificial intelligence, comprising:
Information acquisition unit is stored in database profession for obtaining community personnel information, and by community personnel information;
Information process unit for handling access personal information, and judges according to community personnel information in the database Whether it is community personnel, authorizes corresponding authority;
Intelligent control unit, for giving access personnel passage or warning according to access personnel's rights that have been granted.
Community's access control system based on artificial intelligence that the invention also discloses a kind of, including server, artificial intelligence equipment; Wherein, the server executes community's access control management method as described in any one of the above embodiments based on artificial intelligence.
The invention also discloses a kind of non-transitorycomputer readable storage mediums, are stored thereon with computer program, should Community's access control management method as described in any one of the above embodiments based on artificial intelligence is realized when program is executed by processor.
Compared with the prior art, the beneficial effects of the present invention are: the present invention distinguishes access people by artificial intelligence equipment Member, and judge to authorize access personnel or not authorize related by being compared to the community personnel information being stored in database profession Permission achievees the purpose that entrance guard management function and realizes intelligent management, can find blacklist personnel in time, and for owner And the process that lessee enters has carried out intelligent processing, can find security risk in time.In addition, the present invention can be gate inhibition Management system increases intelligent functions, solves that the inefficiency of Community Watch system, property management personnel be more, personnel identity core Real hardly possible, peak period entrance congestion, the problems such as community's key position security protection is deployed to ensure effective monitoring and control of illegal activities, thief's risk is checked.
The invention will be further described in the following with reference to the drawings and specific embodiments.
Detailed description of the invention
Fig. 1 is a kind of step flow diagram of community's access control management method based on artificial intelligence of the present invention;
Fig. 2 is the sub-step flow diagram that Fig. 1 embodiment step S2 is entered for owner or personnel register;
Fig. 3 is Fig. 2 specific embodiment flow diagram;
Fig. 4 is a kind of community's access control system specific embodiment composition schematic block diagram based on artificial intelligence of the present invention;
Fig. 5 is a kind of community gate inhibition based on artificial intelligence of the invention and monitoring joint defense system specific embodiment composition signal Block diagram.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawing and specific implementation Invention is further described in detail for mode.
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those skilled in the art's every other implementation obtained without creative efforts Example, shall fall within the protection scope of the present invention.
It is a kind of flow chart of community's access control management method based on artificial intelligence in flow chart as shown in Figure 1, including Following steps:
Step S1 acquires community personnel information, distributes corresponding authority according to community personnel information, and by community personnel information Storage is in the database;
Step S2 obtains access personal information by artificial intelligence equipment, and access personal information is believed with community personnel Breath compares judgement, obtains judging result;
Step S3 executes green operation according to judging result artificial intelligence equipment or warning operates;
The community personnel information includes owner, family members, tenant, visitor, staff, outsourcing service provider, blacklist, strange People;The community personnel information is stored separately according to each personnel's type, each personnel's type of the community personnel information It is corresponding with the community personnel of multiple the type;Wherein stranger is passive discerning record, other are actively to record, including increase note newly Record, modification record, deletion record, the operation such as inquiry record, the above operation is finally stored in database, for realizing to society The classification of area's personal information divides rights management.
The wherein distribution permission according to step S1, it may be understood herein that being, some of the staff have the permission by gate inhibition, Except blacklist and strange outer right of access can be given after artificial intelligence equipment correctly identifies personal information.
The step S3 further includes data characteristics analysis, by obtaining daily discrepancy peak to access personal information analysis Phase and discrepancy trough period;And the crucial geographical location for being also easy to produce conflict is obtained, and provide early warning for crucial geographical location.
In embodiment as shown in Figure 2, the step S2 further include entered for owner or personnel registration following sub-step It is rapid:
Sub-step Q1 judges whether access personnel are owner;
Sub-step Q2 judges whether access personnel are owner family members;
Sub-step Q3 judges whether access personnel are lessee;
Sub-step Q4 judges whether access personnel are staff;
Sub-step Q5 judges whether access personnel are outsourcing service provider;
Sub-step Q6 judges that access personnel whether there is in blacklist;
Sub-step Q7 judges whether access personnel are visitor;
Wherein, since sub-step Q1, the judging result of every sub-steps be it is no, judged into next sub-step, If the above sub-step is not met, that is, it is judged as stranger.
Specifically, the access personnel are by sub-step Q1, sub-step Q2, sub-step Q3, sub-step Q4, sub-step Q5, son When step Q7 judgement belongs to community personnel (or the personnel for being temporarily able to access that community), execute green operation, that is, give (temporary Or permanent) right of access;
Wherein, when the access personnel are not belonging to above-mentioned sub-step Q1, sub-step Q2, sub-step Q3, sub-step Q4, sub-step When the personnel of any one of rapid Q5, sub-step Q7, artificial intelligence equipment judge the access personnel for blacklist or stranger, at this time Execute the warning operation.
In embodiment as shown in FIG. 2 and 3, the sub-step Q1 further includes, when the access personnel are owner, Judge the record of owner for whether having the owner in database;
Record of owner if it exists then executes and does not update operation;
Record of owner if it does not exist then continues to judge whether have other records in database;If having other records, The operation for being changed to record of owner is executed, if increasing the operation of record of owner in database executing without other records.It is described Sub-step Q1 enters for realizing owner or the change of owner's information, provides right of access for owner.
In embodiment as shown in FIG. 2 and 3, the sub-step Q2 further includes, when the access personnel are owner family When category, judge whether have corresponding record of owner in database;Community personnel information is added to database in the step S1, when When community personnel is owner, need to add associate people information associated with owner's information in the database, herein sub-step Q2 can search family members from associate people information and correspond to the information of owner to judge, be carried out according to judging result corresponding Permission operation, allows to pass through and increase record, information, or do not allow to pass through, takes above-mentioned measure, detailed estimate of situation is such as Under:
Corresponding record of owner if it exists then executes and judges whether there is family members' record in corresponding record of owner in database;If No family members' record, then execute and execute if there is family members' record in the operation that database increases family members' record and do not update operation;
Corresponding record of owner if it does not exist then executes owner's confirmation operation;If owner is confirmed as family members, execute in data Increase record of owner in library to operate and increase family members' record, if owner confirms non-family members, executes the operation not updated, and/ Or, executing warning operation.
In embodiment as shown in FIG. 2 and 3, the sub-step Q3 further includes, when the access personnel are lessee, Judge whether have the corresponding corresponding record of owner of lessee's information in database;People from community is added to database in the step S1 Member's information needs to add associate people information associated with owner's information in the database when community personnel is owner, this Virgin's step Q3 can search lessee from associate people information and correspond to the information of owner to judge, according to judging result into The corresponding permission operation of row, allows to pass through and increase record, information, or do not allow to pass through, takes above-mentioned measure, judge in detail Situation is as follows:
Corresponding record of owner if it exists then executes and judges whether there is lessee's record in database;If no lessee's record, holds Row executes if there is lessee's record in the operation that database increases lessee's record and does not update operation;
Corresponding record of owner if it does not exist then executes owner's confirmation operation;If owner is confirmed as lessee, execute in data Increase record of owner in library to operate and increase lessee's record, if owner confirms non-lessee, executes the operation not updated, and/ Or, executing warning operation.
In embodiment as shown in FIG. 2 and 3, the sub-step Q4 further includes, when the access personnel are work people When member, judge whether existing staff records in database;Community personnel information is added to database in the step S1, when When community personnel is staff, need to add the specifying information of the staff, such as age, native place, property in the database Not, the contract term.Sub-step Q4 can compare judgement from the specifying information of staff herein, be carried out according to judging result Corresponding permission operation, allows to pass through and increase record, information, or do not allow to pass through, takes above-mentioned measure, judge feelings in detail Condition is as follows:
Staff records if it exists, then executes the operation not updated;
Staff records if it does not exist, then executes other notes whether judgement has the access personnel in the database Record;Other are recorded if it exists, then execute other record records of access personnel described in database being changed to staff's note Record, other are recorded if it does not exist, then execute and record the staff for increasing the access personnel in database.
In embodiment as shown in FIG. 2 and 3, the sub-step Q5 further includes, when the access personnel are outsourcing people When member, judge whether existing outsourcing service provider records in database;Community personnel information is added to database in the step S1, when When community personnel is outsourcing service provider, need to add the specifying information of the outsourcing service provider, such as age, native place, property in the database Not, contract term, working range.Sub-step Q5 can compare judgement from the specifying information of outsourcing service provider herein, according to sentencing Disconnected result carries out corresponding permission operation, allows to pass through and increase record, information, or do not allow to pass through;Take above-mentioned correspondence Measure, detailed estimate of situation are as follows:
Outsourcing service provider records if it exists, then executes the operation not updated;
Outsourcing service provider records if it does not exist, then executes other notes whether judgement has the access personnel in the database Record;Other are recorded if it exists, then execute other record records of access personnel described in database being changed to outsourcing service provider's note Record, other are recorded if it does not exist, then execute and record the outsourcing service provider for increasing the access personnel in database.
In embodiment as shown in FIG. 2 and 3, the sub-step Q6 further includes, when judging that the access personnel belong to When blacklist, judge whether existing blacklist records in database;Blacklist personnel are added to database in the step S1 Information, the black list information can endanger social security events for preventing from obtaining by all kinds of means.Sub-step Q6 can herein The specifying information for the personnel that access and blacklist personal information are compared into judgement, corresponding operation is carried out according to judging result (being additionally provided with the operation that artificial intelligence equipment notifies administrator to alarm herein), if being not belonging to black list information, executes It is as follows to carry out estimate of situation if belonging to blacklist by step Q7:
Blacklist records if it exists, then executes and judge whether blacklist mechanism of deploying to ensure effective monitoring and control of illegal activities is identical;If mechanism of deploying to ensure effective monitoring and control of illegal activities is identical, hold The capable operation not updated, and/or, warning operation is executed, if mechanism of deploying to ensure effective monitoring and control of illegal activities is not identical, executes and updates blacklist and deploy to ensure effective monitoring and control of illegal activities information Operation;
Blacklist records if it does not exist, then executes other records whether judgement has the access personnel in the database; Other are recorded if it exists, then the other information of the access personnel are added to black list information and alarmed, and/or, execute police Accuse operation;Other are recorded if it does not exist, then execute the operation for increasing blacklist record in the database, and set rule of deploying to ensure effective monitoring and control of illegal activities.
Further technical solution is that the sub-step Q7 further includes, when judging that the access personnel belong to visitor, sentencing Whether existing visitor records in disconnected database;Before this, it is also necessary to according to community personnel or access personnel's scheduled visit in advance It asks information, access information is saved into database, in order to which sub-step Q7 judges to compare.
Visitor records if it exists, then executes and judge whether visiting time is consistent;If visiting time is consistent, executes and do not update Operation, if access time is not identical, execute in the database increase visitor record operation;
Visitor records if it does not exist, then executes other records whether judgement has the access personnel in the database;If There are other records, then execute the operation not updated;Other are recorded if it does not exist, then execute and increase visitor's note in the database Record.
In addition, in embodiment as shown in FIG. 2 and 3, if access personal information judges not by sub-step Q1-Q7 It is eligible, then it is determined as stranger, device prompts manager is handled by artificial intelligence.
The invention also discloses a kind of community's entrance guard device based on artificial intelligence, comprising:
Information acquisition unit is stored in database profession for obtaining community personnel information, and by community personnel information;
Information process unit for handling access personal information, and judges according to community personnel information in the database Whether it is community personnel, authorizes corresponding authority;
Intelligent control unit, for giving access personnel passage or warning according to access personnel's rights that have been granted.
Wherein, community's entrance guard device based on artificial intelligence is realized as shown in Figure 1 above-mentioned based on artificial intelligence Community's access control management method and process, the information acquisition unit realize that step S1, the information process unit realize step S2, The intelligent control unit realizes step S3.The information acquisition unit, information process unit and intelligent control unit Comprising artificial intelligence equipment for realizing acquisition of information or information processing or access control.
Community's access control system based on artificial intelligence that the invention also discloses a kind of, including server, artificial intelligence equipment; Wherein, the server executes community's access control management method as described in any one of the above embodiments based on artificial intelligence.It is described artificial Smart machine is for acquiring access personal information, such as face information, sound, height and weight figure contour feature etc..The people Work smart machine is also used to access control hardware, and gate inhibition's hardware is made of front end access control equipment and rear end gate inhibition's platform, wherein before End door is prohibited to be made of various intelligent recognition gate inhibitions (face gate inhibition etc.) again, is responsible for the data of record front end, is formed community space and is arrived The outpost of user's space.The common gate inhibition authority current as community by card, if criminal has taken the card of user Piece discrepancy does not record, and risk is uncontrollable, and by face gate inhibition, and criminal will be without being stealthy.
As shown in Figure 4, a kind of community's access control system based on artificial intelligence is accessed by application layer, safe floor, SLB, API Layer, service layer, data storage layer, infrastructure layer composition.Wherein application layer is made of various front end applications, including gate inhibition sets Standby, data input end, monitoring device and various WEB/APP/ wechat small routine/H5 etc., they form whole system scheme Information input and interactive display part.Safe floor is responsible for information security, the various attacks of protected network, and guardian system is safe and efficient Operation.SLB provides High Availabitity component, increases the reliability of system, reduces Single Point of Faliure.API access layer encapsulates all external API is supplied to application layer, realizes service interfacing.Server is the core of system, handles each logic of class authentication, recognition of face, people Face search, management of deploying to ensure effective monitoring and control of illegal activities, the core functions such as track following match business demand.Data storage layer is realized to community information, monitoring System, log services, visitor's rule, the record of rule of deploying to ensure effective monitoring and control of illegal activities etc. provide foundation for the operation of system and key message investigation.Skill Art facility layer is the running environment of whole system, provides the operation various components of system, serves the stable operation of system.
Community's access control system the invention also discloses another kind based on artificial intelligence, including server, artificial intelligence are set It is standby;Wherein, the server includes memory, processor and is stored on the memory and can run on the processor The program for realizing community's access control management method based on artificial intelligence;It is described for realizing the community based on artificial intelligence The program of access control management method realizes the community as described in any one of the above embodiments based on artificial intelligence when being executed by the processor Access control management method.Memory can be read-only memory (read-only memory, ROM) or can store static information and refer to The other types of static storage device enabled, random access memory (random access memory, RAM)) or can deposit The other types of dynamic memory for storing up information and instruction, is also possible to Electrically Erasable Programmable Read-Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), CD-ROM (Compact Disc Read-Only Memory, CD-ROM) or other optical disc storages, optical disc storage (including compression optical disc, laser disc, light Dish, Digital Versatile Disc, Blu-ray Disc etc.), magnetic disk storage medium or other magnetic storage apparatus or can be used in carry or Store have instruction or data structure form desired program code and can by any other medium of computer access, but It is without being limited thereto.Memory, which can be, to be individually present, and is connected by communication bus with processor.Memory can also and processor It integrates.
The artificial intelligence equipment is for acquiring access personal information, such as face information, sound, height and weight figure wheel Wide feature etc..The artificial intelligence equipment is also used to access control hardware, and gate inhibition's hardware is by front end access control equipment and rear end gate inhibition Platform composition, wherein front end gate inhibition is made of various intelligent recognition gate inhibitions (face gate inhibition etc.) again, is responsible for the data of record front end, Community space is formed to the outpost of user's space.The common gate inhibition authority current as community by card, if criminal The card discrepancy for having taken user does not record, and risk is uncontrollable, and by face gate inhibition, and criminal will be without being stealthy.
In the block diagram of system as shown in Figure 5, based on above-mentioned community's access control system based on artificial intelligence, the present invention Another community gate inhibition based on artificial intelligence and monitoring joint defense system are also disclosed, specifically by intelligent Community information management system, Intelligent access control system, intellectual monitoring deploy to ensure effective monitoring and control of illegal activities system, intelligence community analysis system composition;
Wherein, the intelligent Community information management system scheme uses but is not limited to above-mentioned community's door based on artificial intelligence Prohibit management method, specifically, which is made of acquisition system, WEB front-end and cloud platform, the case where user confirms Under, the acquisition by acquisition system to community personnel information, realization knows the real situation to community personnel, while reducing house keeper and sweeping Lou Shideng Remember cumbersome workload.
Community personnel is divided into owner, family members, tenant, visitor, staff, outsourcing service provider, blacklist, stranger by system Deng being recorded in database respectively, wherein stranger is passive discerning record, other are actively to record, including newly-increased record, modification Record, deletion record, the operation such as inquiry record, realization divide rights management to the classification of community personnel information.
In embodiment as shown in FIG. 2 and 3, intelligent Community information management system scheme owner may be implemented and enter standing current Whether journey has had related record of owner by system queries when owner enters, if there is not adding, if not provided, looking into again Whether have other records, if there is being changed to owner, if not increasing record of owner if asking.When owner leaves, inquiry is related Owner, family members, visitor, tenant etc. record, delete together.
Intelligent access control system scheme uses but is not limited to above-mentioned community's access control management method based on artificial intelligence: the system Scheme is made of front end access control equipment and rear end gate inhibition's platform, and wherein front end gate inhibition is again by various intelligent recognition gate inhibition (face doors Prohibit etc.) composition, it is responsible for the data of record front end, forms community space to the outpost of user's space.Common gate inhibition is made by card For the authority that community is current, if the card discrepancy that criminal has taken user does not record, risk is uncontrollable, and passes through people Face gate inhibition, criminal will be without being stealthy.
Wherein, when the intellectual monitoring system of deploying to ensure effective monitoring and control of illegal activities brings into operation, the data of intelligent Community information management system are first obtained, then together Step deploys to ensure effective monitoring and control of illegal activities, visitor, the information such as lessee, for deploying to ensure effective monitoring and control of illegal activities, comprising the rank deployed to ensure effective monitoring and control of illegal activities, and the reason of deploying to ensure effective monitoring and control of illegal activities, period etc. for deploying to ensure effective monitoring and control of illegal activities Information, for visitor, comprising inviting people's information, visitor's visiting time, visitor's rule etc..Then monitoring device is supervised in real time Control, corresponding processing is done when discovery has owner, family members, tenant, visitor, staff, outsourcing service provider, blacklist, stranger, Intelligent protection cell is safe while convenient serving cell users.
Intellectual monitoring is deployed to ensure effective monitoring and control of illegal activities system schema: the system schema is made of the various acquisition terminals and rear end cloud platform of front end, Form a set of Community Safety bodyguard.The system includes real-time monitoring system, searches for matching system, system of deploying to ensure effective monitoring and control of illegal activities, track following system System.
Real-time monitoring system monitors community's key position in real time, and current behavior is accurately recorded as standby at the first time The information source of case provides the high-definition data input of whole system.
The active that matching system is searched for for community's risk is checked, when theft occurs for community, stranger swarms into, artificially happens suddenly Whens event etc., community workers can actively check a suspect by the system, and system will feed back a suspect in society The record that haunts of area's range forms evidence to the processing of some crucial things, accelerates event handling efficiency or even wanted criminal, essence The dangerous persons such as refreshing patient also can check risk by system, improve Community Safety.
System of deploying to ensure effective monitoring and control of illegal activities realizes that the safety of cell is deployed to ensure effective monitoring and control of illegal activities by increasing blacklist, automatically processes the human face data of acquisition and will count Crucial anticipation is formed according to comparing with blacklist data.If the dangerous person in blacklist by system acquisition and identifies that deploying to ensure effective monitoring and control of illegal activities is System generates relevant deploy to ensure effective monitoring and control of illegal activities and information and alerts, and is prompted to relevant community workers, while passing through the child's of discovery old man Travel time does not return the care experience for increasing child old man to corresponding monitoring human hair early warning after a certain time.
Trajectory Tracking System collects the acquisition data of Community Watch and access control system, by intelligent recognition and geographical location with Track generates related suspicious figure and prejudges relevant risk in the passage track of community, and improves the treatment effeciency of community affairs.
Intelligence community analysis system scheme: the system schema plans as a whole the acquisition data of intelligent entrance guard and intelligent monitoring, timing Relevant data characteristics is analyzed, discovery data rule manages for community and provides reference.Such as by the analyses of data it can be concluded that Daily discrepancy peak period and trough period being entered and left, community can be ensured public security the arranging an order according to class and grade of cleaning worker with flexible arrangement, realize cost efficiency, Or the key area of analysis some events, early warning is provided to key position, the generation that conflict is disagreed is reduced, allows more users body Test the fine of service for infrastructure.
The invention also discloses a kind of non-transitorycomputer readable storage mediums, are stored thereon with computer program, should Community's access control management method as described in any one of the above embodiments based on artificial intelligence is realized when program is executed by processor.It is described to deposit Storage media can be the internal storage unit of aforementioned server, such as the hard disk or memory of server.The storage medium can also To be the plug-in type hard disk being equipped on the External memory equipment of the equipment, such as the equipment, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Further, The storage medium can also both including the equipment internal storage unit and also including External memory equipment.
In conclusion the present invention distinguishes access personnel by artificial intelligence equipment, and by be stored in database profession Community personnel information, which is compared, to judge to authorize access personnel or does not authorize associated rights, reaches entrance guard management function and realizes The purpose of intelligent management can find blacklist personnel in time, and the process entered for owner and lessee has carried out intelligence Energyization processing, can find security risk in time.In addition, the present invention can increase intelligent functions, solution for access control system Certainly the inefficiency of Community Watch system, property management personnel be more, personnel identity verifies hardly possible, peak period entrance congestion, The problems such as community's key position security protection is deployed to ensure effective monitoring and control of illegal activities, thief's risk is checked.
It will be apparent to those skilled in the art that it is various that other can be made according to the above description of the technical scheme and ideas It is corresponding to change and deformation, and all these change and deformation should belong to the claims in the present invention protection scope it It is interior.

Claims (10)

1. a kind of community's access control management method based on artificial intelligence, which comprises the following steps:
Step S1 acquires community personnel information, distributes corresponding authority according to community personnel information, and community personnel information is stored In the database;
Step S2, by artificial intelligence equipment obtain access personal information, and will access personal information and community personnel information into Row comparison judgement, obtains judging result;
Step S3 executes green operation according to judging result artificial intelligence equipment or warning operates;
The community personnel information includes owner, family members, tenant, visitor, staff, outsourcing service provider, blacklist, stranger; The community personnel information is stored separately according to each personnel's type, each personnel's type of the community personnel information is corresponding There is the community personnel of multiple the type;
The step S3 further includes data characteristics analysis, by access personal information analysis obtain daily discrepancy peak period and Enter and leave trough period;And the crucial geographical location for being also easy to produce conflict is obtained, and provide early warning for crucial geographical location.
2. a kind of community's access control management method based on artificial intelligence according to claim 1, which is characterized in that the step Rapid S2 further includes entering for owner or the following sub-step of personnel's registration:
Sub-step Q1 judges whether access personnel are owner;
Sub-step Q2 judges whether access personnel are owner family members;
Sub-step Q3 judges whether access personnel are lessee;
Sub-step Q4 judges whether access personnel are staff;
Sub-step Q5 judges whether access personnel are outsourcing service provider;
Sub-step Q6 judges that access personnel whether there is in blacklist;
Sub-step Q7 judges whether access personnel are visitor;
The access personnel are belonged to by sub-step Q1, sub-step Q2, sub-step Q3, sub-step Q4, sub-step Q5, sub-step Q7 judgement When community personnel, green operation is executed, right of access is given;
Wherein, when the access personnel are not belonging to above-mentioned sub-step Q1, sub-step Q2, sub-step Q3, sub-step Q4, sub-step When the personnel of any one of Q5, sub-step Q7, artificial intelligence equipment judges that the access personnel for blacklist or stranger, hold at this time The row warning operation.
3. a kind of community's access control management method based on artificial intelligence according to claim 2, which is characterized in that the son Step Q1 further includes, when the access personnel are owner, judging the record of owner for whether having the owner in database;
Record of owner if it exists then executes and does not update operation;
Record of owner if it does not exist then continues to judge whether have other records in database;If having other records, execute It is changed to the operation of record of owner, if increasing the operation of record of owner in database executing without other records.
4. a kind of community's access control management method based on artificial intelligence according to claim 2, which is characterized in that the son Step Q2 further includes, when the access personnel are owner family members, judging whether have corresponding record of owner in database;
Corresponding record of owner if it exists then executes and judges whether there is family members' record in corresponding record of owner in database;If houselessness Belong to record, then executes and execute if there is family members' record in the operation that database increases family members' record and do not update operation;
Corresponding record of owner if it does not exist then executes owner's confirmation operation;If owner is confirmed as family members, execute in the database Increase record of owner and operates and increase family members' record, if the non-family members of owner's confirmation, execute the operation not updated, and/or, it holds Row warning operation.
5. a kind of community's access control management method based on artificial intelligence according to claim 2, which is characterized in that the son Step Q3 further includes, and when the access personnel are lessee, judges whether have the corresponding corresponding industry of lessee's information in database Master record;
Corresponding record of owner if it exists then executes and judges whether there is lessee's record in database;If no lessee's record, executes The operation that database increases lessee's record executes if there is lessee's record and does not update operation;
Corresponding record of owner if it does not exist then executes owner's confirmation operation;If owner is confirmed as lessee, execute in the database Increase record of owner and operates and increase lessee's record, if the non-lessee of owner's confirmation, executes the operation not updated, and/or, it holds Row warning operation.
6. a kind of community's access control management method based on artificial intelligence according to claim 2, which is characterized in that the son Step Q4 further includes, and when the access personnel are staff, judges whether existing staff records in database;
Staff records if it exists, then executes the operation not updated;
Staff records if it does not exist, then executes other records whether judgement has the access personnel in the database;If There are other records, then execute other record records of access personnel described in database being changed to staff's record, if There is no other records, then execute and record the staff for increasing the access personnel in database.
7. a kind of community's access control management method based on artificial intelligence according to claim 2, which is characterized in that the son Step Q5 further includes, and when the access personnel are outsourcing service provider, judges whether existing outsourcing service provider records in database;
Outsourcing service provider records if it exists, then executes the operation not updated;
Outsourcing service provider records if it does not exist, then executes other records whether judgement has the access personnel in the database;If There are other records, then execute other record records of access personnel described in database being changed to outsourcing service provider's record, if There is no other records, then execute and record the outsourcing service provider for increasing the access personnel in database;
The sub-step Q6 further includes, and when judging that the access personnel belong to blacklist, judges whether have in database Blacklist record;
Blacklist records if it exists, then executes and judge whether blacklist mechanism of deploying to ensure effective monitoring and control of illegal activities is identical;If mechanism of deploying to ensure effective monitoring and control of illegal activities is identical, execute not The operation of update, and/or, warning operation is executed, if mechanism of deploying to ensure effective monitoring and control of illegal activities is not identical, executes and updates blacklist and deploy to ensure effective monitoring and control of illegal activities the behaviour of information Make;
Blacklist records if it does not exist, then executes other records whether judgement has the access personnel in the database;If depositing In other records, then the other information of the access personnel is added to black list information and alarmed, and/or, execute warning behaviour Make;Other are recorded if it does not exist, then execute the operation for increasing blacklist record in the database, and set rule of deploying to ensure effective monitoring and control of illegal activities;
The sub-step Q7 further includes, when judging that the access personnel belong to visitor, judging whether have visit in database Visitor's record;
Visitor records if it exists, then executes and judge whether visiting time is consistent;If visiting time is consistent, the behaviour not updated is executed Make, if access time is not identical, executes and increase visitor's record operation in the database;
Visitor records if it does not exist, then executes other records whether judgement has the access personnel in the database;If it exists Other records, then execute the operation not updated;Other are recorded if it does not exist, then execute and increase visitor's record in the database.
8. a kind of community's entrance guard device based on artificial intelligence characterized by comprising
Information acquisition unit is stored in database profession for obtaining community personnel information, and by community personnel information;
Information process unit for handling access personal information, and judges whether according to community personnel information in the database For community personnel, corresponding authority is authorized;
Intelligent control unit, for giving access personnel passage or warning according to access personnel's rights that have been granted.
9. a kind of community's access control system based on artificial intelligence, which is characterized in that including server, artificial intelligence equipment;Wherein, The server executes such as community's access control management method of any of claims 1-7 based on artificial intelligence.
10. a kind of non-transitorycomputer readable storage medium, is stored thereon with computer program, which is executed by processor Shi Shixian community's access control management method for example of any of claims 1-7 based on artificial intelligence.
CN201910263214.0A 2019-04-02 2019-04-02 Based on artificial intelligence community access control management method and device and system and storage medium Pending CN110009543A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910263214.0A CN110009543A (en) 2019-04-02 2019-04-02 Based on artificial intelligence community access control management method and device and system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910263214.0A CN110009543A (en) 2019-04-02 2019-04-02 Based on artificial intelligence community access control management method and device and system and storage medium

Publications (1)

Publication Number Publication Date
CN110009543A true CN110009543A (en) 2019-07-12

Family

ID=67169786

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910263214.0A Pending CN110009543A (en) 2019-04-02 2019-04-02 Based on artificial intelligence community access control management method and device and system and storage medium

Country Status (1)

Country Link
CN (1) CN110009543A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110473328A (en) * 2019-09-09 2019-11-19 腾讯科技(深圳)有限公司 Community's access control management method and device, storage medium, electronic equipment
CN110648443A (en) * 2019-10-08 2020-01-03 中国建设银行股份有限公司 Access control verification method, device, equipment and medium
CN110706381A (en) * 2019-09-30 2020-01-17 深圳市纳泽科技有限公司 Apartment management system capable of automatically detecting house and automatically freezing door lock password
CN111402459A (en) * 2020-02-24 2020-07-10 重庆特斯联智慧科技股份有限公司 Intelligent access control system with community comprehensive management function and method thereof
CN111508616A (en) * 2020-02-18 2020-08-07 内蒙古自治区生物技术研究院 Contact-free community emergency management system and method
CN112365647A (en) * 2020-11-27 2021-02-12 杭州海康威视数字技术股份有限公司 Passage control method, device and system and electronic equipment
CN112562161A (en) * 2020-12-08 2021-03-26 福建红点科技有限公司 Based on 5G thing networking and AI intelligent entrance guard integrated management system
CN113158713A (en) * 2020-10-22 2021-07-23 西安天和防务技术股份有限公司 Valley management system
CN113313861A (en) * 2021-05-27 2021-08-27 武汉楚冠信息科技有限公司 High intelligent integration access control system of security
CN113382046A (en) * 2021-05-27 2021-09-10 青岛海信智慧生活科技股份有限公司 Method and device for changing face information in community
CN113379245A (en) * 2021-06-10 2021-09-10 四川警察学院 Urban community personnel management method and device
CN113963524A (en) * 2021-10-26 2022-01-21 云知声智能科技股份有限公司 Method and device for identifying strangers in park, electronic equipment and storage medium
CN116485587A (en) * 2023-04-21 2023-07-25 深圳润高智慧产业有限公司 Community service acquisition method, community service providing method, electronic device and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106157394A (en) * 2015-04-24 2016-11-23 胡飞虎 Community's networked door access control system and community based on this system access method
CN107610283A (en) * 2017-08-21 2018-01-19 东莞市富卡网络科技有限公司 Visitor's data processing method, device, storage medium and server
CN107833315A (en) * 2017-10-20 2018-03-23 四川省守望信息科技有限责任公司 Cell automates access control system
CN108052925A (en) * 2017-12-28 2018-05-18 江西高创保安服务技术有限公司 A kind of cell personnel archives intelligent management
CN207637201U (en) * 2017-09-30 2018-07-20 河南星云慧通信技术有限公司 Intelligence community system
CN109064601A (en) * 2018-07-30 2018-12-21 深圳招商建筑科技有限公司 A kind of intelligence gate sentry robot implementation method
CN109544746A (en) * 2018-11-20 2019-03-29 北京千丁互联科技有限公司 A kind of community's access control system control method and its device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106157394A (en) * 2015-04-24 2016-11-23 胡飞虎 Community's networked door access control system and community based on this system access method
CN107610283A (en) * 2017-08-21 2018-01-19 东莞市富卡网络科技有限公司 Visitor's data processing method, device, storage medium and server
CN207637201U (en) * 2017-09-30 2018-07-20 河南星云慧通信技术有限公司 Intelligence community system
CN107833315A (en) * 2017-10-20 2018-03-23 四川省守望信息科技有限责任公司 Cell automates access control system
CN108052925A (en) * 2017-12-28 2018-05-18 江西高创保安服务技术有限公司 A kind of cell personnel archives intelligent management
CN109064601A (en) * 2018-07-30 2018-12-21 深圳招商建筑科技有限公司 A kind of intelligence gate sentry robot implementation method
CN109544746A (en) * 2018-11-20 2019-03-29 北京千丁互联科技有限公司 A kind of community's access control system control method and its device

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110473328A (en) * 2019-09-09 2019-11-19 腾讯科技(深圳)有限公司 Community's access control management method and device, storage medium, electronic equipment
CN110706381A (en) * 2019-09-30 2020-01-17 深圳市纳泽科技有限公司 Apartment management system capable of automatically detecting house and automatically freezing door lock password
CN110648443A (en) * 2019-10-08 2020-01-03 中国建设银行股份有限公司 Access control verification method, device, equipment and medium
CN111508616A (en) * 2020-02-18 2020-08-07 内蒙古自治区生物技术研究院 Contact-free community emergency management system and method
CN111402459A (en) * 2020-02-24 2020-07-10 重庆特斯联智慧科技股份有限公司 Intelligent access control system with community comprehensive management function and method thereof
CN113158713A (en) * 2020-10-22 2021-07-23 西安天和防务技术股份有限公司 Valley management system
CN112365647A (en) * 2020-11-27 2021-02-12 杭州海康威视数字技术股份有限公司 Passage control method, device and system and electronic equipment
CN112562161A (en) * 2020-12-08 2021-03-26 福建红点科技有限公司 Based on 5G thing networking and AI intelligent entrance guard integrated management system
CN113313861A (en) * 2021-05-27 2021-08-27 武汉楚冠信息科技有限公司 High intelligent integration access control system of security
CN113382046A (en) * 2021-05-27 2021-09-10 青岛海信智慧生活科技股份有限公司 Method and device for changing face information in community
CN113382046B (en) * 2021-05-27 2022-07-01 青岛海信智慧生活科技股份有限公司 Method and device for changing face information in community
CN113379245A (en) * 2021-06-10 2021-09-10 四川警察学院 Urban community personnel management method and device
CN113963524A (en) * 2021-10-26 2022-01-21 云知声智能科技股份有限公司 Method and device for identifying strangers in park, electronic equipment and storage medium
CN116485587A (en) * 2023-04-21 2023-07-25 深圳润高智慧产业有限公司 Community service acquisition method, community service providing method, electronic device and storage medium
CN116485587B (en) * 2023-04-21 2024-04-09 深圳润高智慧产业有限公司 Community service acquisition method, community service providing method, electronic device and storage medium

Similar Documents

Publication Publication Date Title
CN110009543A (en) Based on artificial intelligence community access control management method and device and system and storage medium
CN110009784A (en) Monitoring joint defence method and apparatus and system and storage medium based on artificial intelligence
CN104484617B (en) A kind of Access and control strategy of database method based on many strategy fusions
CN106846577A (en) Personnel's discrepancy authority control method and device based on recognition of face
US9355107B2 (en) Crime investigation system
CN109544728B (en) Regional population management and control system and method
CN209265530U (en) A kind of community visitor intelligence register system
CN108269330B (en) Access control method, device and system
CN103442354B (en) A kind of movable police terminal security managing and control system
CN106886970A (en) A kind of floating population's management system and its application method with warning function
CN103210165A (en) Systems and methods for accessing or managing secured storage space
CN109615256A (en) Wisdom garden security protection risk control method, storage medium, electronic equipment and system
CN110288261A (en) Estate management management system based on big data platform
CN106097508A (en) A kind of based on certificate or the access control system of certificate Quick Response Code with method
CN114926314A (en) Ubiquitous autonomous controllable Internet of things equipment system and method
CN109712291A (en) Open method, device and the server of electronic gate
CN109102600A (en) Cell access permission management method and system
CN110443912A (en) A kind of access control management method, device and terminal device
CN116012991A (en) Method, device and related equipment for site access management
CN111292454A (en) Intelligent identity access control identification system and method
Ganiron Jr et al. Development of an online crime management & reporting system
CN109034294A (en) A kind of air defence instrument box supervisory systems and monitoring and managing method
CN107808238A (en) A kind of management method and system for equipping assets
Mollah et al. Proposed e-police system for enhancement of e-government services of Bangladesh
CN114241687A (en) Storage cabinet management method and device, storage cabinet, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination