CN110009543A - Based on artificial intelligence community access control management method and device and system and storage medium - Google Patents
Based on artificial intelligence community access control management method and device and system and storage medium Download PDFInfo
- Publication number
- CN110009543A CN110009543A CN201910263214.0A CN201910263214A CN110009543A CN 110009543 A CN110009543 A CN 110009543A CN 201910263214 A CN201910263214 A CN 201910263214A CN 110009543 A CN110009543 A CN 110009543A
- Authority
- CN
- China
- Prior art keywords
- personnel
- record
- community
- access
- database
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
Abstract
The invention discloses one kind based on artificial intelligence community access control management method and device and system and storage medium, the following steps are included: step S1, community personnel information is acquired, distributes corresponding authority according to community personnel information, and in the database by the storage of community personnel information;Step S2 obtains access personal information by artificial intelligence equipment, and access personal information and community personnel information is compared judgement, obtains judging result;Step S3 executes green operation according to judging result artificial intelligence equipment or warning operates;The community personnel information includes owner, family members, tenant, visitor, staff, outsourcing service provider, blacklist, stranger;The community personnel information is stored separately according to each personnel's type, each personnel's type of the community personnel information is corresponding with the community personnel of multiple the type;The step S3 further includes data characteristics analysis, obtains daily discrepancy peak period to access personal information analysis and enters and leaves trough period.
Description
Technical field
The present invention relates to entrance guard management technical field, more particularly to it is a kind of based on artificial intelligence community access control management method and
Device and system and storage medium.
Background technique
Community is the basic unit for carrying social population, is the important agent of urban development.But due to many reasons,
There is also various problems, such as technology and product to lack open, compatibility and interconnectivity, unified technical standard in the building of communities
It is not yet formed, product function is single, does not have perceptional function etc., and especially important place is, many community gate inhibitions take people
The phenomenon that work is let pass or cell phone software automatic door opening, owner and lessee are entered to reside on simply without audit, therefore there are many peaces
Full hidden danger.Current community service cannot achieve comprehensive Intelligent gate control, for the intelligent management method of gate inhibition's processing
Do not occur yet.
Technology of Internet of things based on artificial intelligence be able to solve current community's access control there are the problem of, be community it is complete
Face intelligent development provides technical support.But also lack systematic about community's entrance guard management based on artificial intelligence at present
Method is used to study and instruct the all-round construction of modernization community's access control system.
It is currently, there are and largely combines community's access control applications of artificial intelligence technology also in scheme or trial operation stage,
The excavation of community's access control applications demand is also insufficient, and traditional access control system how is transformed, to set up accurate and intelligentized control method
Access control system becomes a problem in the urgent need to address.
The invention proposes one kind based on artificial intelligence community access control management method and device and system for these reasons
And storage medium, it is intended to solve the problems, such as above-mentioned, and be also used to improve experience of the resident for community gate inhibition.
Summary of the invention
In order to meet above-mentioned requirements, it is an object of the present invention to provide one kind to be based on the entrance guard management of artificial intelligence community
Method, this method can flexibly and effectively solve that low efficiency existing for current access control system, there are the brings such as security risk
Adverse effect, reduces the artificial participation step of manager, improves user experience, increase the safety coefficient of community gate inhibition.
Second object of the present invention is to propose a kind of community's entrance guard device based on artificial intelligence, for realizing above-mentioned
Based on artificial intelligence community access control management method, the purpose of this method is realized.
It is a kind of based on artificial intelligence community access control system it is another object of the present invention to propose, it is able to achieve above-mentioned be based on
Artificial intelligence community access control management method reaches the same effect of this method.
Fourth object of the present invention is to propose a kind of non-transitorycomputer readable storage medium, is stored thereon with meter
Calculation machine program.
To achieve the goals above, the invention adopts the following technical scheme:
A kind of community's access control management method based on artificial intelligence, comprising the following steps:
Step S1 acquires community personnel information, and in the database by the storage of community personnel information;
Step S2 obtains access personal information by artificial intelligence equipment, and access personal information is believed with community personnel
Breath compares judgement, obtains judging result;
Step S3 executes green operation according to judging result artificial intelligence equipment or warning operates;
The community personnel information includes owner, family members, tenant, visitor, staff, outsourcing service provider, blacklist, strange
People;The community personnel information is stored separately according to each personnel's type, each personnel's type of the community personnel information
It is corresponding with the community personnel of multiple the type;
The step S3 further includes data characteristics analysis, by obtaining daily discrepancy peak to access personal information analysis
Phase and discrepancy trough period;And the crucial geographical location for being also easy to produce conflict is obtained, and provide early warning for crucial geographical location.
Further technical solution is, the step S2 further includes entering for owner or the following sub-step of personnel's registration:
Sub-step Q1 judges whether access personnel are owner;
Sub-step Q2 judges whether access personnel are owner family members;
Sub-step Q3 judges whether access personnel are lessee;
Sub-step Q4 judges whether access personnel are staff;
Sub-step Q5 judges whether access personnel are outsourcing service provider;
Sub-step Q6 judges that access personnel whether there is in blacklist;
Sub-step Q7 judges whether access personnel are visitor;
The access personnel are sentenced by sub-step Q1, sub-step Q2, sub-step Q3, sub-step Q4, sub-step Q5, sub-step Q7
It is disconnected when belonging to community personnel, green operation is executed, right of access is given;
Wherein, when the access personnel are not belonging to above-mentioned sub-step Q1, sub-step Q2, sub-step Q3, sub-step Q4, sub-step
When the personnel of any one of rapid Q5, sub-step Q7, artificial intelligence equipment judge the access personnel for blacklist or stranger, at this time
Execute the warning operation.
Further technical solution is that the sub-step Q1 further includes, when the access personnel are owner, judging database
In whether have the record of owner of the owner;
Record of owner if it exists then executes and does not update operation;
Record of owner if it does not exist then continues to judge whether have other records in database;If having other records,
The operation for being changed to record of owner is executed, if increasing the operation of record of owner in database executing without other records.
Further technical solution is that the sub-step Q2 further includes, when the access personnel are owner family members, judging number
According to whether having corresponding record of owner in library;
Corresponding record of owner if it exists then executes and judges whether there is family members' record in corresponding record of owner in database;If
No family members' record, then execute and execute if there is family members' record in the operation that database increases family members' record and do not update operation;
Corresponding record of owner if it does not exist then executes owner's confirmation operation;If owner is confirmed as family members, execute in data
Increase record of owner in library to operate and increase family members' record, if owner confirms non-family members, executes the operation not updated, and/
Or, executing warning operation.
Further technical solution is that the sub-step Q3 further includes, when the access personnel are lessee, judging database
In whether the existing corresponding corresponding record of owner of lessee's information;
Corresponding record of owner if it exists then executes and judges whether there is lessee's record in database;If no lessee's record, holds
Row executes if there is lessee's record in the operation that database increases lessee's record and does not update operation;
Corresponding record of owner if it does not exist then executes owner's confirmation operation;If owner is confirmed as lessee, execute in data
Increase record of owner in library to operate and increase lessee's record, if owner confirms non-lessee, executes the operation not updated, and/
Or, executing warning operation.
Further technical solution is that the sub-step Q4 further includes, when the access personnel are staff, judging number
According in library, whether existing staff is recorded;
Staff records if it exists, then executes the operation not updated;
Staff records if it does not exist, then executes other notes whether judgement has the access personnel in the database
Record;Other are recorded if it exists, then execute other record records of access personnel described in database being changed to staff's note
Record, other are recorded if it does not exist, then execute and record the staff for increasing the access personnel in database.
Further technical solution is that the sub-step Q5 further includes, when the access personnel are outsourcing service provider, judging number
According in library, whether existing outsourcing service provider is recorded;
Outsourcing service provider records if it exists, then executes the operation not updated;
Outsourcing service provider records if it does not exist, then executes other notes whether judgement has the access personnel in the database
Record;Other are recorded if it exists, then execute other record records of access personnel described in database being changed to outsourcing service provider's note
Record, other are recorded if it does not exist, then execute and record the outsourcing service provider for increasing the access personnel in database.
Further technical solution is that the sub-step Q6 further includes, when judging that the access personnel belong to blacklist,
Judge whether existing blacklist records in database;
Blacklist records if it exists, then executes and judge whether blacklist mechanism of deploying to ensure effective monitoring and control of illegal activities is identical;If mechanism of deploying to ensure effective monitoring and control of illegal activities is identical, hold
The capable operation not updated, and/or, warning operation is executed, if mechanism of deploying to ensure effective monitoring and control of illegal activities is not identical, executes and updates blacklist and deploy to ensure effective monitoring and control of illegal activities information
Operation;
Blacklist records if it does not exist, then executes other records whether judgement has the access personnel in the database;
Other are recorded if it exists, then the other information of the access personnel are added to black list information and alarmed, and/or, execute police
Accuse operation;Other are recorded if it does not exist, then execute the operation for increasing blacklist record in the database, and set rule of deploying to ensure effective monitoring and control of illegal activities.
Further technical solution is that the sub-step Q7 further includes, when judging that the access personnel belong to visitor, sentencing
Whether existing visitor records in disconnected database;
Visitor records if it exists, then executes and judge whether visiting time is consistent;If visiting time is consistent, executes and do not update
Operation, if access time is not identical, execute in the database increase visitor record operation;
Visitor records if it does not exist, then executes other records whether judgement has the access personnel in the database;If
There are other records, then execute the operation not updated;Other are recorded if it does not exist, then execute and increase visitor's note in the database
Record.
The invention also discloses a kind of community's entrance guard device based on artificial intelligence, comprising:
Information acquisition unit is stored in database profession for obtaining community personnel information, and by community personnel information;
Information process unit for handling access personal information, and judges according to community personnel information in the database
Whether it is community personnel, authorizes corresponding authority;
Intelligent control unit, for giving access personnel passage or warning according to access personnel's rights that have been granted.
Community's access control system based on artificial intelligence that the invention also discloses a kind of, including server, artificial intelligence equipment;
Wherein, the server executes community's access control management method as described in any one of the above embodiments based on artificial intelligence.
The invention also discloses a kind of non-transitorycomputer readable storage mediums, are stored thereon with computer program, should
Community's access control management method as described in any one of the above embodiments based on artificial intelligence is realized when program is executed by processor.
Compared with the prior art, the beneficial effects of the present invention are: the present invention distinguishes access people by artificial intelligence equipment
Member, and judge to authorize access personnel or not authorize related by being compared to the community personnel information being stored in database profession
Permission achievees the purpose that entrance guard management function and realizes intelligent management, can find blacklist personnel in time, and for owner
And the process that lessee enters has carried out intelligent processing, can find security risk in time.In addition, the present invention can be gate inhibition
Management system increases intelligent functions, solves that the inefficiency of Community Watch system, property management personnel be more, personnel identity core
Real hardly possible, peak period entrance congestion, the problems such as community's key position security protection is deployed to ensure effective monitoring and control of illegal activities, thief's risk is checked.
The invention will be further described in the following with reference to the drawings and specific embodiments.
Detailed description of the invention
Fig. 1 is a kind of step flow diagram of community's access control management method based on artificial intelligence of the present invention;
Fig. 2 is the sub-step flow diagram that Fig. 1 embodiment step S2 is entered for owner or personnel register;
Fig. 3 is Fig. 2 specific embodiment flow diagram;
Fig. 4 is a kind of community's access control system specific embodiment composition schematic block diagram based on artificial intelligence of the present invention;
Fig. 5 is a kind of community gate inhibition based on artificial intelligence of the invention and monitoring joint defense system specific embodiment composition signal
Block diagram.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawing and specific implementation
Invention is further described in detail for mode.
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those skilled in the art's every other implementation obtained without creative efforts
Example, shall fall within the protection scope of the present invention.
It is a kind of flow chart of community's access control management method based on artificial intelligence in flow chart as shown in Figure 1, including
Following steps:
Step S1 acquires community personnel information, distributes corresponding authority according to community personnel information, and by community personnel information
Storage is in the database;
Step S2 obtains access personal information by artificial intelligence equipment, and access personal information is believed with community personnel
Breath compares judgement, obtains judging result;
Step S3 executes green operation according to judging result artificial intelligence equipment or warning operates;
The community personnel information includes owner, family members, tenant, visitor, staff, outsourcing service provider, blacklist, strange
People;The community personnel information is stored separately according to each personnel's type, each personnel's type of the community personnel information
It is corresponding with the community personnel of multiple the type;Wherein stranger is passive discerning record, other are actively to record, including increase note newly
Record, modification record, deletion record, the operation such as inquiry record, the above operation is finally stored in database, for realizing to society
The classification of area's personal information divides rights management.
The wherein distribution permission according to step S1, it may be understood herein that being, some of the staff have the permission by gate inhibition,
Except blacklist and strange outer right of access can be given after artificial intelligence equipment correctly identifies personal information.
The step S3 further includes data characteristics analysis, by obtaining daily discrepancy peak to access personal information analysis
Phase and discrepancy trough period;And the crucial geographical location for being also easy to produce conflict is obtained, and provide early warning for crucial geographical location.
In embodiment as shown in Figure 2, the step S2 further include entered for owner or personnel registration following sub-step
It is rapid:
Sub-step Q1 judges whether access personnel are owner;
Sub-step Q2 judges whether access personnel are owner family members;
Sub-step Q3 judges whether access personnel are lessee;
Sub-step Q4 judges whether access personnel are staff;
Sub-step Q5 judges whether access personnel are outsourcing service provider;
Sub-step Q6 judges that access personnel whether there is in blacklist;
Sub-step Q7 judges whether access personnel are visitor;
Wherein, since sub-step Q1, the judging result of every sub-steps be it is no, judged into next sub-step,
If the above sub-step is not met, that is, it is judged as stranger.
Specifically, the access personnel are by sub-step Q1, sub-step Q2, sub-step Q3, sub-step Q4, sub-step Q5, son
When step Q7 judgement belongs to community personnel (or the personnel for being temporarily able to access that community), execute green operation, that is, give (temporary
Or permanent) right of access;
Wherein, when the access personnel are not belonging to above-mentioned sub-step Q1, sub-step Q2, sub-step Q3, sub-step Q4, sub-step
When the personnel of any one of rapid Q5, sub-step Q7, artificial intelligence equipment judge the access personnel for blacklist or stranger, at this time
Execute the warning operation.
In embodiment as shown in FIG. 2 and 3, the sub-step Q1 further includes, when the access personnel are owner,
Judge the record of owner for whether having the owner in database;
Record of owner if it exists then executes and does not update operation;
Record of owner if it does not exist then continues to judge whether have other records in database;If having other records,
The operation for being changed to record of owner is executed, if increasing the operation of record of owner in database executing without other records.It is described
Sub-step Q1 enters for realizing owner or the change of owner's information, provides right of access for owner.
In embodiment as shown in FIG. 2 and 3, the sub-step Q2 further includes, when the access personnel are owner family
When category, judge whether have corresponding record of owner in database;Community personnel information is added to database in the step S1, when
When community personnel is owner, need to add associate people information associated with owner's information in the database, herein sub-step
Q2 can search family members from associate people information and correspond to the information of owner to judge, be carried out according to judging result corresponding
Permission operation, allows to pass through and increase record, information, or do not allow to pass through, takes above-mentioned measure, detailed estimate of situation is such as
Under:
Corresponding record of owner if it exists then executes and judges whether there is family members' record in corresponding record of owner in database;If
No family members' record, then execute and execute if there is family members' record in the operation that database increases family members' record and do not update operation;
Corresponding record of owner if it does not exist then executes owner's confirmation operation;If owner is confirmed as family members, execute in data
Increase record of owner in library to operate and increase family members' record, if owner confirms non-family members, executes the operation not updated, and/
Or, executing warning operation.
In embodiment as shown in FIG. 2 and 3, the sub-step Q3 further includes, when the access personnel are lessee,
Judge whether have the corresponding corresponding record of owner of lessee's information in database;People from community is added to database in the step S1
Member's information needs to add associate people information associated with owner's information in the database when community personnel is owner, this
Virgin's step Q3 can search lessee from associate people information and correspond to the information of owner to judge, according to judging result into
The corresponding permission operation of row, allows to pass through and increase record, information, or do not allow to pass through, takes above-mentioned measure, judge in detail
Situation is as follows:
Corresponding record of owner if it exists then executes and judges whether there is lessee's record in database;If no lessee's record, holds
Row executes if there is lessee's record in the operation that database increases lessee's record and does not update operation;
Corresponding record of owner if it does not exist then executes owner's confirmation operation;If owner is confirmed as lessee, execute in data
Increase record of owner in library to operate and increase lessee's record, if owner confirms non-lessee, executes the operation not updated, and/
Or, executing warning operation.
In embodiment as shown in FIG. 2 and 3, the sub-step Q4 further includes, when the access personnel are work people
When member, judge whether existing staff records in database;Community personnel information is added to database in the step S1, when
When community personnel is staff, need to add the specifying information of the staff, such as age, native place, property in the database
Not, the contract term.Sub-step Q4 can compare judgement from the specifying information of staff herein, be carried out according to judging result
Corresponding permission operation, allows to pass through and increase record, information, or do not allow to pass through, takes above-mentioned measure, judge feelings in detail
Condition is as follows:
Staff records if it exists, then executes the operation not updated;
Staff records if it does not exist, then executes other notes whether judgement has the access personnel in the database
Record;Other are recorded if it exists, then execute other record records of access personnel described in database being changed to staff's note
Record, other are recorded if it does not exist, then execute and record the staff for increasing the access personnel in database.
In embodiment as shown in FIG. 2 and 3, the sub-step Q5 further includes, when the access personnel are outsourcing people
When member, judge whether existing outsourcing service provider records in database;Community personnel information is added to database in the step S1, when
When community personnel is outsourcing service provider, need to add the specifying information of the outsourcing service provider, such as age, native place, property in the database
Not, contract term, working range.Sub-step Q5 can compare judgement from the specifying information of outsourcing service provider herein, according to sentencing
Disconnected result carries out corresponding permission operation, allows to pass through and increase record, information, or do not allow to pass through;Take above-mentioned correspondence
Measure, detailed estimate of situation are as follows:
Outsourcing service provider records if it exists, then executes the operation not updated;
Outsourcing service provider records if it does not exist, then executes other notes whether judgement has the access personnel in the database
Record;Other are recorded if it exists, then execute other record records of access personnel described in database being changed to outsourcing service provider's note
Record, other are recorded if it does not exist, then execute and record the outsourcing service provider for increasing the access personnel in database.
In embodiment as shown in FIG. 2 and 3, the sub-step Q6 further includes, when judging that the access personnel belong to
When blacklist, judge whether existing blacklist records in database;Blacklist personnel are added to database in the step S1
Information, the black list information can endanger social security events for preventing from obtaining by all kinds of means.Sub-step Q6 can herein
The specifying information for the personnel that access and blacklist personal information are compared into judgement, corresponding operation is carried out according to judging result
(being additionally provided with the operation that artificial intelligence equipment notifies administrator to alarm herein), if being not belonging to black list information, executes
It is as follows to carry out estimate of situation if belonging to blacklist by step Q7:
Blacklist records if it exists, then executes and judge whether blacklist mechanism of deploying to ensure effective monitoring and control of illegal activities is identical;If mechanism of deploying to ensure effective monitoring and control of illegal activities is identical, hold
The capable operation not updated, and/or, warning operation is executed, if mechanism of deploying to ensure effective monitoring and control of illegal activities is not identical, executes and updates blacklist and deploy to ensure effective monitoring and control of illegal activities information
Operation;
Blacklist records if it does not exist, then executes other records whether judgement has the access personnel in the database;
Other are recorded if it exists, then the other information of the access personnel are added to black list information and alarmed, and/or, execute police
Accuse operation;Other are recorded if it does not exist, then execute the operation for increasing blacklist record in the database, and set rule of deploying to ensure effective monitoring and control of illegal activities.
Further technical solution is that the sub-step Q7 further includes, when judging that the access personnel belong to visitor, sentencing
Whether existing visitor records in disconnected database;Before this, it is also necessary to according to community personnel or access personnel's scheduled visit in advance
It asks information, access information is saved into database, in order to which sub-step Q7 judges to compare.
Visitor records if it exists, then executes and judge whether visiting time is consistent;If visiting time is consistent, executes and do not update
Operation, if access time is not identical, execute in the database increase visitor record operation;
Visitor records if it does not exist, then executes other records whether judgement has the access personnel in the database;If
There are other records, then execute the operation not updated;Other are recorded if it does not exist, then execute and increase visitor's note in the database
Record.
In addition, in embodiment as shown in FIG. 2 and 3, if access personal information judges not by sub-step Q1-Q7
It is eligible, then it is determined as stranger, device prompts manager is handled by artificial intelligence.
The invention also discloses a kind of community's entrance guard device based on artificial intelligence, comprising:
Information acquisition unit is stored in database profession for obtaining community personnel information, and by community personnel information;
Information process unit for handling access personal information, and judges according to community personnel information in the database
Whether it is community personnel, authorizes corresponding authority;
Intelligent control unit, for giving access personnel passage or warning according to access personnel's rights that have been granted.
Wherein, community's entrance guard device based on artificial intelligence is realized as shown in Figure 1 above-mentioned based on artificial intelligence
Community's access control management method and process, the information acquisition unit realize that step S1, the information process unit realize step S2,
The intelligent control unit realizes step S3.The information acquisition unit, information process unit and intelligent control unit
Comprising artificial intelligence equipment for realizing acquisition of information or information processing or access control.
Community's access control system based on artificial intelligence that the invention also discloses a kind of, including server, artificial intelligence equipment;
Wherein, the server executes community's access control management method as described in any one of the above embodiments based on artificial intelligence.It is described artificial
Smart machine is for acquiring access personal information, such as face information, sound, height and weight figure contour feature etc..The people
Work smart machine is also used to access control hardware, and gate inhibition's hardware is made of front end access control equipment and rear end gate inhibition's platform, wherein before
End door is prohibited to be made of various intelligent recognition gate inhibitions (face gate inhibition etc.) again, is responsible for the data of record front end, is formed community space and is arrived
The outpost of user's space.The common gate inhibition authority current as community by card, if criminal has taken the card of user
Piece discrepancy does not record, and risk is uncontrollable, and by face gate inhibition, and criminal will be without being stealthy.
As shown in Figure 4, a kind of community's access control system based on artificial intelligence is accessed by application layer, safe floor, SLB, API
Layer, service layer, data storage layer, infrastructure layer composition.Wherein application layer is made of various front end applications, including gate inhibition sets
Standby, data input end, monitoring device and various WEB/APP/ wechat small routine/H5 etc., they form whole system scheme
Information input and interactive display part.Safe floor is responsible for information security, the various attacks of protected network, and guardian system is safe and efficient
Operation.SLB provides High Availabitity component, increases the reliability of system, reduces Single Point of Faliure.API access layer encapsulates all external
API is supplied to application layer, realizes service interfacing.Server is the core of system, handles each logic of class authentication, recognition of face, people
Face search, management of deploying to ensure effective monitoring and control of illegal activities, the core functions such as track following match business demand.Data storage layer is realized to community information, monitoring
System, log services, visitor's rule, the record of rule of deploying to ensure effective monitoring and control of illegal activities etc. provide foundation for the operation of system and key message investigation.Skill
Art facility layer is the running environment of whole system, provides the operation various components of system, serves the stable operation of system.
Community's access control system the invention also discloses another kind based on artificial intelligence, including server, artificial intelligence are set
It is standby;Wherein, the server includes memory, processor and is stored on the memory and can run on the processor
The program for realizing community's access control management method based on artificial intelligence;It is described for realizing the community based on artificial intelligence
The program of access control management method realizes the community as described in any one of the above embodiments based on artificial intelligence when being executed by the processor
Access control management method.Memory can be read-only memory (read-only memory, ROM) or can store static information and refer to
The other types of static storage device enabled, random access memory (random access memory, RAM)) or can deposit
The other types of dynamic memory for storing up information and instruction, is also possible to Electrically Erasable Programmable Read-Only Memory
(Electrically Erasable Programmable Read-Only Memory, EEPROM), CD-ROM (Compact
Disc Read-Only Memory, CD-ROM) or other optical disc storages, optical disc storage (including compression optical disc, laser disc, light
Dish, Digital Versatile Disc, Blu-ray Disc etc.), magnetic disk storage medium or other magnetic storage apparatus or can be used in carry or
Store have instruction or data structure form desired program code and can by any other medium of computer access, but
It is without being limited thereto.Memory, which can be, to be individually present, and is connected by communication bus with processor.Memory can also and processor
It integrates.
The artificial intelligence equipment is for acquiring access personal information, such as face information, sound, height and weight figure wheel
Wide feature etc..The artificial intelligence equipment is also used to access control hardware, and gate inhibition's hardware is by front end access control equipment and rear end gate inhibition
Platform composition, wherein front end gate inhibition is made of various intelligent recognition gate inhibitions (face gate inhibition etc.) again, is responsible for the data of record front end,
Community space is formed to the outpost of user's space.The common gate inhibition authority current as community by card, if criminal
The card discrepancy for having taken user does not record, and risk is uncontrollable, and by face gate inhibition, and criminal will be without being stealthy.
In the block diagram of system as shown in Figure 5, based on above-mentioned community's access control system based on artificial intelligence, the present invention
Another community gate inhibition based on artificial intelligence and monitoring joint defense system are also disclosed, specifically by intelligent Community information management system,
Intelligent access control system, intellectual monitoring deploy to ensure effective monitoring and control of illegal activities system, intelligence community analysis system composition;
Wherein, the intelligent Community information management system scheme uses but is not limited to above-mentioned community's door based on artificial intelligence
Prohibit management method, specifically, which is made of acquisition system, WEB front-end and cloud platform, the case where user confirms
Under, the acquisition by acquisition system to community personnel information, realization knows the real situation to community personnel, while reducing house keeper and sweeping Lou Shideng
Remember cumbersome workload.
Community personnel is divided into owner, family members, tenant, visitor, staff, outsourcing service provider, blacklist, stranger by system
Deng being recorded in database respectively, wherein stranger is passive discerning record, other are actively to record, including newly-increased record, modification
Record, deletion record, the operation such as inquiry record, realization divide rights management to the classification of community personnel information.
In embodiment as shown in FIG. 2 and 3, intelligent Community information management system scheme owner may be implemented and enter standing current
Whether journey has had related record of owner by system queries when owner enters, if there is not adding, if not provided, looking into again
Whether have other records, if there is being changed to owner, if not increasing record of owner if asking.When owner leaves, inquiry is related
Owner, family members, visitor, tenant etc. record, delete together.
Intelligent access control system scheme uses but is not limited to above-mentioned community's access control management method based on artificial intelligence: the system
Scheme is made of front end access control equipment and rear end gate inhibition's platform, and wherein front end gate inhibition is again by various intelligent recognition gate inhibition (face doors
Prohibit etc.) composition, it is responsible for the data of record front end, forms community space to the outpost of user's space.Common gate inhibition is made by card
For the authority that community is current, if the card discrepancy that criminal has taken user does not record, risk is uncontrollable, and passes through people
Face gate inhibition, criminal will be without being stealthy.
Wherein, when the intellectual monitoring system of deploying to ensure effective monitoring and control of illegal activities brings into operation, the data of intelligent Community information management system are first obtained, then together
Step deploys to ensure effective monitoring and control of illegal activities, visitor, the information such as lessee, for deploying to ensure effective monitoring and control of illegal activities, comprising the rank deployed to ensure effective monitoring and control of illegal activities, and the reason of deploying to ensure effective monitoring and control of illegal activities, period etc. for deploying to ensure effective monitoring and control of illegal activities
Information, for visitor, comprising inviting people's information, visitor's visiting time, visitor's rule etc..Then monitoring device is supervised in real time
Control, corresponding processing is done when discovery has owner, family members, tenant, visitor, staff, outsourcing service provider, blacklist, stranger,
Intelligent protection cell is safe while convenient serving cell users.
Intellectual monitoring is deployed to ensure effective monitoring and control of illegal activities system schema: the system schema is made of the various acquisition terminals and rear end cloud platform of front end,
Form a set of Community Safety bodyguard.The system includes real-time monitoring system, searches for matching system, system of deploying to ensure effective monitoring and control of illegal activities, track following system
System.
Real-time monitoring system monitors community's key position in real time, and current behavior is accurately recorded as standby at the first time
The information source of case provides the high-definition data input of whole system.
The active that matching system is searched for for community's risk is checked, when theft occurs for community, stranger swarms into, artificially happens suddenly
Whens event etc., community workers can actively check a suspect by the system, and system will feed back a suspect in society
The record that haunts of area's range forms evidence to the processing of some crucial things, accelerates event handling efficiency or even wanted criminal, essence
The dangerous persons such as refreshing patient also can check risk by system, improve Community Safety.
System of deploying to ensure effective monitoring and control of illegal activities realizes that the safety of cell is deployed to ensure effective monitoring and control of illegal activities by increasing blacklist, automatically processes the human face data of acquisition and will count
Crucial anticipation is formed according to comparing with blacklist data.If the dangerous person in blacklist by system acquisition and identifies that deploying to ensure effective monitoring and control of illegal activities is
System generates relevant deploy to ensure effective monitoring and control of illegal activities and information and alerts, and is prompted to relevant community workers, while passing through the child's of discovery old man
Travel time does not return the care experience for increasing child old man to corresponding monitoring human hair early warning after a certain time.
Trajectory Tracking System collects the acquisition data of Community Watch and access control system, by intelligent recognition and geographical location with
Track generates related suspicious figure and prejudges relevant risk in the passage track of community, and improves the treatment effeciency of community affairs.
Intelligence community analysis system scheme: the system schema plans as a whole the acquisition data of intelligent entrance guard and intelligent monitoring, timing
Relevant data characteristics is analyzed, discovery data rule manages for community and provides reference.Such as by the analyses of data it can be concluded that
Daily discrepancy peak period and trough period being entered and left, community can be ensured public security the arranging an order according to class and grade of cleaning worker with flexible arrangement, realize cost efficiency,
Or the key area of analysis some events, early warning is provided to key position, the generation that conflict is disagreed is reduced, allows more users body
Test the fine of service for infrastructure.
The invention also discloses a kind of non-transitorycomputer readable storage mediums, are stored thereon with computer program, should
Community's access control management method as described in any one of the above embodiments based on artificial intelligence is realized when program is executed by processor.It is described to deposit
Storage media can be the internal storage unit of aforementioned server, such as the hard disk or memory of server.The storage medium can also
To be the plug-in type hard disk being equipped on the External memory equipment of the equipment, such as the equipment, intelligent memory card (Smart
Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Further,
The storage medium can also both including the equipment internal storage unit and also including External memory equipment.
In conclusion the present invention distinguishes access personnel by artificial intelligence equipment, and by be stored in database profession
Community personnel information, which is compared, to judge to authorize access personnel or does not authorize associated rights, reaches entrance guard management function and realizes
The purpose of intelligent management can find blacklist personnel in time, and the process entered for owner and lessee has carried out intelligence
Energyization processing, can find security risk in time.In addition, the present invention can increase intelligent functions, solution for access control system
Certainly the inefficiency of Community Watch system, property management personnel be more, personnel identity verifies hardly possible, peak period entrance congestion,
The problems such as community's key position security protection is deployed to ensure effective monitoring and control of illegal activities, thief's risk is checked.
It will be apparent to those skilled in the art that it is various that other can be made according to the above description of the technical scheme and ideas
It is corresponding to change and deformation, and all these change and deformation should belong to the claims in the present invention protection scope it
It is interior.
Claims (10)
1. a kind of community's access control management method based on artificial intelligence, which comprises the following steps:
Step S1 acquires community personnel information, distributes corresponding authority according to community personnel information, and community personnel information is stored
In the database;
Step S2, by artificial intelligence equipment obtain access personal information, and will access personal information and community personnel information into
Row comparison judgement, obtains judging result;
Step S3 executes green operation according to judging result artificial intelligence equipment or warning operates;
The community personnel information includes owner, family members, tenant, visitor, staff, outsourcing service provider, blacklist, stranger;
The community personnel information is stored separately according to each personnel's type, each personnel's type of the community personnel information is corresponding
There is the community personnel of multiple the type;
The step S3 further includes data characteristics analysis, by access personal information analysis obtain daily discrepancy peak period and
Enter and leave trough period;And the crucial geographical location for being also easy to produce conflict is obtained, and provide early warning for crucial geographical location.
2. a kind of community's access control management method based on artificial intelligence according to claim 1, which is characterized in that the step
Rapid S2 further includes entering for owner or the following sub-step of personnel's registration:
Sub-step Q1 judges whether access personnel are owner;
Sub-step Q2 judges whether access personnel are owner family members;
Sub-step Q3 judges whether access personnel are lessee;
Sub-step Q4 judges whether access personnel are staff;
Sub-step Q5 judges whether access personnel are outsourcing service provider;
Sub-step Q6 judges that access personnel whether there is in blacklist;
Sub-step Q7 judges whether access personnel are visitor;
The access personnel are belonged to by sub-step Q1, sub-step Q2, sub-step Q3, sub-step Q4, sub-step Q5, sub-step Q7 judgement
When community personnel, green operation is executed, right of access is given;
Wherein, when the access personnel are not belonging to above-mentioned sub-step Q1, sub-step Q2, sub-step Q3, sub-step Q4, sub-step
When the personnel of any one of Q5, sub-step Q7, artificial intelligence equipment judges that the access personnel for blacklist or stranger, hold at this time
The row warning operation.
3. a kind of community's access control management method based on artificial intelligence according to claim 2, which is characterized in that the son
Step Q1 further includes, when the access personnel are owner, judging the record of owner for whether having the owner in database;
Record of owner if it exists then executes and does not update operation;
Record of owner if it does not exist then continues to judge whether have other records in database;If having other records, execute
It is changed to the operation of record of owner, if increasing the operation of record of owner in database executing without other records.
4. a kind of community's access control management method based on artificial intelligence according to claim 2, which is characterized in that the son
Step Q2 further includes, when the access personnel are owner family members, judging whether have corresponding record of owner in database;
Corresponding record of owner if it exists then executes and judges whether there is family members' record in corresponding record of owner in database;If houselessness
Belong to record, then executes and execute if there is family members' record in the operation that database increases family members' record and do not update operation;
Corresponding record of owner if it does not exist then executes owner's confirmation operation;If owner is confirmed as family members, execute in the database
Increase record of owner and operates and increase family members' record, if the non-family members of owner's confirmation, execute the operation not updated, and/or, it holds
Row warning operation.
5. a kind of community's access control management method based on artificial intelligence according to claim 2, which is characterized in that the son
Step Q3 further includes, and when the access personnel are lessee, judges whether have the corresponding corresponding industry of lessee's information in database
Master record;
Corresponding record of owner if it exists then executes and judges whether there is lessee's record in database;If no lessee's record, executes
The operation that database increases lessee's record executes if there is lessee's record and does not update operation;
Corresponding record of owner if it does not exist then executes owner's confirmation operation;If owner is confirmed as lessee, execute in the database
Increase record of owner and operates and increase lessee's record, if the non-lessee of owner's confirmation, executes the operation not updated, and/or, it holds
Row warning operation.
6. a kind of community's access control management method based on artificial intelligence according to claim 2, which is characterized in that the son
Step Q4 further includes, and when the access personnel are staff, judges whether existing staff records in database;
Staff records if it exists, then executes the operation not updated;
Staff records if it does not exist, then executes other records whether judgement has the access personnel in the database;If
There are other records, then execute other record records of access personnel described in database being changed to staff's record, if
There is no other records, then execute and record the staff for increasing the access personnel in database.
7. a kind of community's access control management method based on artificial intelligence according to claim 2, which is characterized in that the son
Step Q5 further includes, and when the access personnel are outsourcing service provider, judges whether existing outsourcing service provider records in database;
Outsourcing service provider records if it exists, then executes the operation not updated;
Outsourcing service provider records if it does not exist, then executes other records whether judgement has the access personnel in the database;If
There are other records, then execute other record records of access personnel described in database being changed to outsourcing service provider's record, if
There is no other records, then execute and record the outsourcing service provider for increasing the access personnel in database;
The sub-step Q6 further includes, and when judging that the access personnel belong to blacklist, judges whether have in database
Blacklist record;
Blacklist records if it exists, then executes and judge whether blacklist mechanism of deploying to ensure effective monitoring and control of illegal activities is identical;If mechanism of deploying to ensure effective monitoring and control of illegal activities is identical, execute not
The operation of update, and/or, warning operation is executed, if mechanism of deploying to ensure effective monitoring and control of illegal activities is not identical, executes and updates blacklist and deploy to ensure effective monitoring and control of illegal activities the behaviour of information
Make;
Blacklist records if it does not exist, then executes other records whether judgement has the access personnel in the database;If depositing
In other records, then the other information of the access personnel is added to black list information and alarmed, and/or, execute warning behaviour
Make;Other are recorded if it does not exist, then execute the operation for increasing blacklist record in the database, and set rule of deploying to ensure effective monitoring and control of illegal activities;
The sub-step Q7 further includes, when judging that the access personnel belong to visitor, judging whether have visit in database
Visitor's record;
Visitor records if it exists, then executes and judge whether visiting time is consistent;If visiting time is consistent, the behaviour not updated is executed
Make, if access time is not identical, executes and increase visitor's record operation in the database;
Visitor records if it does not exist, then executes other records whether judgement has the access personnel in the database;If it exists
Other records, then execute the operation not updated;Other are recorded if it does not exist, then execute and increase visitor's record in the database.
8. a kind of community's entrance guard device based on artificial intelligence characterized by comprising
Information acquisition unit is stored in database profession for obtaining community personnel information, and by community personnel information;
Information process unit for handling access personal information, and judges whether according to community personnel information in the database
For community personnel, corresponding authority is authorized;
Intelligent control unit, for giving access personnel passage or warning according to access personnel's rights that have been granted.
9. a kind of community's access control system based on artificial intelligence, which is characterized in that including server, artificial intelligence equipment;Wherein,
The server executes such as community's access control management method of any of claims 1-7 based on artificial intelligence.
10. a kind of non-transitorycomputer readable storage medium, is stored thereon with computer program, which is executed by processor
Shi Shixian community's access control management method for example of any of claims 1-7 based on artificial intelligence.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910263214.0A CN110009543A (en) | 2019-04-02 | 2019-04-02 | Based on artificial intelligence community access control management method and device and system and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910263214.0A CN110009543A (en) | 2019-04-02 | 2019-04-02 | Based on artificial intelligence community access control management method and device and system and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110009543A true CN110009543A (en) | 2019-07-12 |
Family
ID=67169786
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910263214.0A Pending CN110009543A (en) | 2019-04-02 | 2019-04-02 | Based on artificial intelligence community access control management method and device and system and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110009543A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110473328A (en) * | 2019-09-09 | 2019-11-19 | 腾讯科技(深圳)有限公司 | Community's access control management method and device, storage medium, electronic equipment |
CN110648443A (en) * | 2019-10-08 | 2020-01-03 | 中国建设银行股份有限公司 | Access control verification method, device, equipment and medium |
CN110706381A (en) * | 2019-09-30 | 2020-01-17 | 深圳市纳泽科技有限公司 | Apartment management system capable of automatically detecting house and automatically freezing door lock password |
CN111402459A (en) * | 2020-02-24 | 2020-07-10 | 重庆特斯联智慧科技股份有限公司 | Intelligent access control system with community comprehensive management function and method thereof |
CN111508616A (en) * | 2020-02-18 | 2020-08-07 | 内蒙古自治区生物技术研究院 | Contact-free community emergency management system and method |
CN112365647A (en) * | 2020-11-27 | 2021-02-12 | 杭州海康威视数字技术股份有限公司 | Passage control method, device and system and electronic equipment |
CN112562161A (en) * | 2020-12-08 | 2021-03-26 | 福建红点科技有限公司 | Based on 5G thing networking and AI intelligent entrance guard integrated management system |
CN113158713A (en) * | 2020-10-22 | 2021-07-23 | 西安天和防务技术股份有限公司 | Valley management system |
CN113313861A (en) * | 2021-05-27 | 2021-08-27 | 武汉楚冠信息科技有限公司 | High intelligent integration access control system of security |
CN113382046A (en) * | 2021-05-27 | 2021-09-10 | 青岛海信智慧生活科技股份有限公司 | Method and device for changing face information in community |
CN113379245A (en) * | 2021-06-10 | 2021-09-10 | 四川警察学院 | Urban community personnel management method and device |
CN113963524A (en) * | 2021-10-26 | 2022-01-21 | 云知声智能科技股份有限公司 | Method and device for identifying strangers in park, electronic equipment and storage medium |
CN116485587A (en) * | 2023-04-21 | 2023-07-25 | 深圳润高智慧产业有限公司 | Community service acquisition method, community service providing method, electronic device and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106157394A (en) * | 2015-04-24 | 2016-11-23 | 胡飞虎 | Community's networked door access control system and community based on this system access method |
CN107610283A (en) * | 2017-08-21 | 2018-01-19 | 东莞市富卡网络科技有限公司 | Visitor's data processing method, device, storage medium and server |
CN107833315A (en) * | 2017-10-20 | 2018-03-23 | 四川省守望信息科技有限责任公司 | Cell automates access control system |
CN108052925A (en) * | 2017-12-28 | 2018-05-18 | 江西高创保安服务技术有限公司 | A kind of cell personnel archives intelligent management |
CN207637201U (en) * | 2017-09-30 | 2018-07-20 | 河南星云慧通信技术有限公司 | Intelligence community system |
CN109064601A (en) * | 2018-07-30 | 2018-12-21 | 深圳招商建筑科技有限公司 | A kind of intelligence gate sentry robot implementation method |
CN109544746A (en) * | 2018-11-20 | 2019-03-29 | 北京千丁互联科技有限公司 | A kind of community's access control system control method and its device |
-
2019
- 2019-04-02 CN CN201910263214.0A patent/CN110009543A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106157394A (en) * | 2015-04-24 | 2016-11-23 | 胡飞虎 | Community's networked door access control system and community based on this system access method |
CN107610283A (en) * | 2017-08-21 | 2018-01-19 | 东莞市富卡网络科技有限公司 | Visitor's data processing method, device, storage medium and server |
CN207637201U (en) * | 2017-09-30 | 2018-07-20 | 河南星云慧通信技术有限公司 | Intelligence community system |
CN107833315A (en) * | 2017-10-20 | 2018-03-23 | 四川省守望信息科技有限责任公司 | Cell automates access control system |
CN108052925A (en) * | 2017-12-28 | 2018-05-18 | 江西高创保安服务技术有限公司 | A kind of cell personnel archives intelligent management |
CN109064601A (en) * | 2018-07-30 | 2018-12-21 | 深圳招商建筑科技有限公司 | A kind of intelligence gate sentry robot implementation method |
CN109544746A (en) * | 2018-11-20 | 2019-03-29 | 北京千丁互联科技有限公司 | A kind of community's access control system control method and its device |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110473328A (en) * | 2019-09-09 | 2019-11-19 | 腾讯科技(深圳)有限公司 | Community's access control management method and device, storage medium, electronic equipment |
CN110706381A (en) * | 2019-09-30 | 2020-01-17 | 深圳市纳泽科技有限公司 | Apartment management system capable of automatically detecting house and automatically freezing door lock password |
CN110648443A (en) * | 2019-10-08 | 2020-01-03 | 中国建设银行股份有限公司 | Access control verification method, device, equipment and medium |
CN111508616A (en) * | 2020-02-18 | 2020-08-07 | 内蒙古自治区生物技术研究院 | Contact-free community emergency management system and method |
CN111402459A (en) * | 2020-02-24 | 2020-07-10 | 重庆特斯联智慧科技股份有限公司 | Intelligent access control system with community comprehensive management function and method thereof |
CN113158713A (en) * | 2020-10-22 | 2021-07-23 | 西安天和防务技术股份有限公司 | Valley management system |
CN112365647A (en) * | 2020-11-27 | 2021-02-12 | 杭州海康威视数字技术股份有限公司 | Passage control method, device and system and electronic equipment |
CN112562161A (en) * | 2020-12-08 | 2021-03-26 | 福建红点科技有限公司 | Based on 5G thing networking and AI intelligent entrance guard integrated management system |
CN113313861A (en) * | 2021-05-27 | 2021-08-27 | 武汉楚冠信息科技有限公司 | High intelligent integration access control system of security |
CN113382046A (en) * | 2021-05-27 | 2021-09-10 | 青岛海信智慧生活科技股份有限公司 | Method and device for changing face information in community |
CN113382046B (en) * | 2021-05-27 | 2022-07-01 | 青岛海信智慧生活科技股份有限公司 | Method and device for changing face information in community |
CN113379245A (en) * | 2021-06-10 | 2021-09-10 | 四川警察学院 | Urban community personnel management method and device |
CN113963524A (en) * | 2021-10-26 | 2022-01-21 | 云知声智能科技股份有限公司 | Method and device for identifying strangers in park, electronic equipment and storage medium |
CN116485587A (en) * | 2023-04-21 | 2023-07-25 | 深圳润高智慧产业有限公司 | Community service acquisition method, community service providing method, electronic device and storage medium |
CN116485587B (en) * | 2023-04-21 | 2024-04-09 | 深圳润高智慧产业有限公司 | Community service acquisition method, community service providing method, electronic device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110009543A (en) | Based on artificial intelligence community access control management method and device and system and storage medium | |
CN110009784A (en) | Monitoring joint defence method and apparatus and system and storage medium based on artificial intelligence | |
CN104484617B (en) | A kind of Access and control strategy of database method based on many strategy fusions | |
CN106846577A (en) | Personnel's discrepancy authority control method and device based on recognition of face | |
US9355107B2 (en) | Crime investigation system | |
CN109544728B (en) | Regional population management and control system and method | |
CN209265530U (en) | A kind of community visitor intelligence register system | |
CN108269330B (en) | Access control method, device and system | |
CN103442354B (en) | A kind of movable police terminal security managing and control system | |
CN106886970A (en) | A kind of floating population's management system and its application method with warning function | |
CN103210165A (en) | Systems and methods for accessing or managing secured storage space | |
CN109615256A (en) | Wisdom garden security protection risk control method, storage medium, electronic equipment and system | |
CN110288261A (en) | Estate management management system based on big data platform | |
CN106097508A (en) | A kind of based on certificate or the access control system of certificate Quick Response Code with method | |
CN114926314A (en) | Ubiquitous autonomous controllable Internet of things equipment system and method | |
CN109712291A (en) | Open method, device and the server of electronic gate | |
CN109102600A (en) | Cell access permission management method and system | |
CN110443912A (en) | A kind of access control management method, device and terminal device | |
CN116012991A (en) | Method, device and related equipment for site access management | |
CN111292454A (en) | Intelligent identity access control identification system and method | |
Ganiron Jr et al. | Development of an online crime management & reporting system | |
CN109034294A (en) | A kind of air defence instrument box supervisory systems and monitoring and managing method | |
CN107808238A (en) | A kind of management method and system for equipping assets | |
Mollah et al. | Proposed e-police system for enhancement of e-government services of Bangladesh | |
CN114241687A (en) | Storage cabinet management method and device, storage cabinet, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |