CN110288744A - A kind of access control system - Google Patents

A kind of access control system Download PDF

Info

Publication number
CN110288744A
CN110288744A CN201910637943.8A CN201910637943A CN110288744A CN 110288744 A CN110288744 A CN 110288744A CN 201910637943 A CN201910637943 A CN 201910637943A CN 110288744 A CN110288744 A CN 110288744A
Authority
CN
China
Prior art keywords
information
vehicles
slave computer
host computer
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910637943.8A
Other languages
Chinese (zh)
Inventor
孙茂杰
李福存
张楠
谷庆
邵淑炜
郭燕凯
陈琦
陶泽慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Jinheng Information Technology Co Ltd
Original Assignee
Jiangsu Jinheng Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Jinheng Information Technology Co Ltd filed Critical Jiangsu Jinheng Information Technology Co Ltd
Priority to CN201910637943.8A priority Critical patent/CN110288744A/en
Publication of CN110288744A publication Critical patent/CN110288744A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/51Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/58Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/583Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/60Type of objects
    • G06V20/62Text, e.g. of license plates, overlay texts or captions on TV images
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/33Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/60Type of objects
    • G06V20/62Text, e.g. of license plates, overlay texts or captions on TV images
    • G06V20/625License plates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V2201/00Indexing scheme relating to image or video recognition or understanding
    • G06V2201/08Detecting or categorising vehicles

Abstract

The application provides a kind of access control system, the slave computer opened and closed the system comprises multiple nodes, control node and the host computer with slave computer network connection.Within the system, slave computer is used to obtain the identification information of vehicle to be verified;It searches in local data base with the presence or absence of local information of vehicles identical with the identification information;It is instructed if it does, generating first and letting pass;If it does not, the identification information is uploaded to host computer;The host computer is for searching in host computer database with the presence or absence of newly-increased information of vehicles identical with the identification information;It is instructed if it does, generating second and letting pass;Described second is let pass to instruct and is issued to slave computer.In the peak period of vehicles while passing factory, slave computer is treated verification vehicle in local and is verified, and host computer is just uploaded to when can not locally verify, and the data reduced between slave computer and host computer are transmitted, to improve the working efficiency of access control system.

Description

A kind of access control system
Technical field
This application involves field of security technologies, and in particular to a kind of access control system.
Background technique
Access control system is applied to the various specific regions for needing to limit personnel or vehicle pass-through, such as plant area or cell etc.. Typical plant area's access control system as shown in Figure 1, include host computer, slave computer, the Car license recognition camera being connected with slave computer and Limit the banister of vehicle pass-through.When banister of the vehicle to be verified close to gate sentry, Car license recognition camera shoots license plate picture, passes through It parses license plate picture and obtains the information of vehicles such as license plate number;Slave computer obtains the information of vehicles, using the information of vehicles as to be verified Information of vehicles is uploaded to host computer;Host computer according to preparatory typing and store information of vehicles of letting pass, it is determined whether let pass with The vehicle to be verified, and issue pass-through command;Slave computer obtains the pass-through command, controls banister according to the pass-through command Folding.
For large-scale plant area, as shown in Figure 1, being usually provided with multiple nodes, restricted vehicles while passing is set at node Gate sentry, that is, there are multiple slave computers, information of vehicles to be verified is uploaded to host computer, is made and being sentenced by host computer by each slave computer Break and issues pass-through command.In the peak period of vehicles while passing plant area, host computer receives a plurality of information of vehicles to be verified, and will be more The corresponding pass-through command of item information of vehicles to be verified is issued to each slave computer respectively, will be under multiple pass-through commands in the same period Massive band width can be occupied by being sent to slave computer, be easy to cause backlog, and the time of pass-through command is received so as to cause slave computer Delay.
Summary of the invention
The application provides a kind of access control system, to solve existing plant area's access control system at the peak of vehicles while passing plant area Section, the low problem of working efficiency.
The application provides a kind of access control system, the system comprises multiple nodes, control node open and close slave computer and With the host computer of slave computer network connection, wherein
Slave computer is used to obtain the identification information of vehicle to be verified;
Slave computer is for searching in local data base with the presence or absence of local information of vehicles identical with the identification information;
If there is local information of vehicles identical with the identification information in local data base, slave computer is for generating the One, which lets pass, instructs;
If there is no local information of vehicles identical with the identification information in local data base, slave computer is used for institute It states identification information and is uploaded to host computer;
The host computer is for searching in host computer database with the presence or absence of newly-increased vehicle identical with the identification information Information;
If there is newly-increased information of vehicles identical with the identification information, the host computer in the host computer database For generating the second clearance instruction;
The host computer, which is used to that described second to let pass to instruct, is issued to slave computer;
Slave computer is used to let pass according to described second and instruct, and control node is opened, with the vehicle to be verified of letting pass.
Optionally,
The host computer is used for after the second clearance instruction is issued to slave computer, by the newly-increased information of vehicles In the amount of communication data low period, it is issued to the slave computer.
Optionally,
The host computer is used for after the second clearance instruction is issued to slave computer, obtains the communication number of slave computer According to the amount low period;
The host computer is for judging whether current time is in the amount of communication data low period of the slave computer;
If so, the host computer is used to the newly-increased information of vehicles being issued to slave computer.
Optionally,
Slave computer is for receiving the newly-increased information of vehicles that the host computer issues;
Slave computer is used to the newly-increased information of vehicles being stored in local data base;
Slave computer for making the history information of vehicles stored in the newly-increased information of vehicles and local data base jointly For local information of vehicles.
Optionally,
Slave computer is used for after the newly-increased information of vehicles is stored in local data base, and the transmission of Xiang Suoshu host computer is deposited Storage successfully instruction;
The host computer is used to send storage successfully instruction according to the host computer, by the same of the newly-increased information of vehicles Step status indication is changed to synchronize.
Optionally,
The host computer is used to whether there is newly-increased vehicle identical with the identification information in searching host computer database Before information, newly-increased information of vehicles is obtained;
The host computer for establishing information of vehicles table in the host computer database, and the information of vehicles table is for storing institute State newly-increased information of vehicles;
The host computer is used in the information of vehicles table be to increase information of vehicles described in each item newly to establish synchronous regime mark Note, and set not synchronous for the initial synchronisation status indication of the newly-increased information of vehicles.
Optionally,
Slave computer is used for after receiving the second clearance instruction that the host computer issues, and the identification information is added To local data base;
Slave computer is used to be recorded according to the history vehicle pass-through of each node, obtains current time and the slave computer Apart from nearest backup node, the backup node is in the amount of communication data low period at current time;
Slave computer is used to the identification information being sent to the backup node.
Optionally,
If there is no local information of vehicles identical with the identification information in local data base, slave computer is also used to obtain Take the identity information of the driver of vehicle to be verified;
Slave computer is for searching in local data base with the presence or absence of National Officer's information corresponding with the identity information;
If it does, slave computer is instructed for generating third clearance, with the vehicle to be verified of letting pass.
Optionally,
If there is no local information of vehicles identical with the identification information in local data base, slave computer is also used to obtain Take the nameplate photo of the vehicle to be verified;
Slave computer is used to extract the unique tag serial number in the nameplate photo;
Slave computer is for searching in local data base with the presence or absence of phone number corresponding with the unique tag serial number;
If it does, slave computer is used to send the link with default identifying code to the corresponding mobile phone of the phone number;
Slave computer is used to obtain the target verification code shown in the driver of the vehicle to be verified, and judges the target Whether identifying code matches with the default identifying code;
If it does, slave computer is instructed for generating the 4th clearance, with the vehicle to be verified of letting pass.
From the above technical scheme, the application provides a kind of access control system, and the system comprises multiple nodes, control section The slave computer of point folding and the host computer being connected to the network with slave computer.Within the system, still through the preparatory typing of host computer Newly-increased information of vehicles is issued to slave computer by newly-increased information of vehicles, host computer, and slave computer receives and stores newly-increased information of vehicles, this Sample, slave computer can treat verification vehicle in local and be verified, and the data reduced between slave computer and host computer are transmitted, thus Improve the working efficiency of access control system.
Detailed description of the invention
In order to illustrate more clearly of the technical solution of the application, letter will be made to attached drawing needed in the embodiment below Singly introduce, it should be apparent that, for those of ordinary skills, without creative efforts, also Other drawings may be obtained according to these drawings without any creative labor.
Fig. 1 is the schematic diagram of a scenario for plant area's access control system that the prior art provides;
Fig. 2 is a kind of work flow diagram of access control system provided by the embodiments of the present application;
Fig. 3 is a kind of work flow diagram of second of embodiment of access control system provided by the embodiments of the present application;
Fig. 4 is a kind of work flow diagram of the third embodiment of access control system provided by the embodiments of the present application;
Fig. 5 is a kind of work flow diagram of 4th kind of embodiment of access control system provided by the embodiments of the present application.
Specific embodiment
To solve existing plant area's access control system in the peak period of vehicles while passing plant area, the low problem of working efficiency, sheet Application provides a kind of access control system.
In order to explain the application, the application is described in detail by the following examples.
Fig. 2 shows a kind of work flow diagrams of access control system provided by the embodiments of the present application, and the system is according to following Step executes:
Step 101, slave computer obtains the identification information of vehicle to be verified.
In the step, identification information is can to uniquely determine the information of the vehicle to be tested, such as license plate number.Usually In the case of, Car license recognition camera is provided at gate sentry, when vehicle to be tested drives into the region that Car license recognition camera can identify, Car license recognition camera captures license plate number automatically, and license plate number is sent to slave computer.
Step 102, slave computer is searched in local data base with the presence or absence of local vehicle letter identical with the identification information Breath.
If it does, executing the operation of step 103;If it does not, executing the operation of step 104.
Step 103, if there is local information of vehicles identical with the identification information in local data base, slave computer is raw It lets pass and instructs at first.
In the step, if there is local information of vehicles identical with the identification information in local data base, illustrate institute State the corresponding vehicle to be released of identification information and belong to the vehicle that can be let pass, therefore generate first and let pass instruction, with let pass it is described to Verify vehicle.
Step 104, if there is no local information of vehicles identical with the identification information, slave computers in local data base The identification information is uploaded to host computer.
If whole newly-increased information of vehicles (newly-increased information of vehicles of letting pass) are stored in local data base, at this Ground database can determine the vehicle to be verified there is no in the case where local information of vehicles identical with the identification information Belong to the vehicle that can not be let pass.It is not that whole newly-increased information of vehicles is stored in local number but in the embodiment of the present application It is stored in host computer according to that in library, may there is part to increase information of vehicles newly, it is therefore desirable to be sent to the identification information upper Machine, and the judgement whether let pass is made by host computer.
Step 105, the host computer is searched in host computer database with the presence or absence of identical with the identification information newly-increased Information of vehicles.
If it does, executing the operation of step 106.It can not if it does not, can determine that the vehicle to be verified belongs to The vehicle of clearance generates forbidden instruction, and will carry out instruction and be issued to slave computer.
Step 106, if there is newly-increased information of vehicles identical with the identification information, institute in the host computer database It states host computer and generates the second clearance instruction.
Step 107, the host computer, which lets pass to instruct described second, is issued to slave computer;
Step 108, slave computer is let pass according to described second and is instructed, and control node is opened, with the vehicle to be verified of letting pass.
From the above technical scheme, the application provides a kind of access control system, and the system comprises multiple nodes, control section The slave computer of point folding and the host computer being connected to the network with slave computer.Within the system, still through the preparatory typing of host computer Newly-increased information of vehicles is issued to slave computer by newly-increased information of vehicles, host computer, and slave computer receives and stores newly-increased information of vehicles, this Sample, slave computer can treat verification vehicle in local and be verified, and the data reduced between slave computer and host computer are transmitted, thus Improve the working efficiency of access control system.
Access control system provided by the present application includes multiple nodes, the corresponding gate sentry of each node, and for a plant area, Each gate sentry is due to its responsibility or the difference in geographical location, in different time sections, how much presence of each gate sentry passing vehicle Difference.For example, the vehicle into plant area is more in work hours section, the gate sentry passing vehicle of corresponding entrance can be relatively more.According to History vehicle pass-through record it is more to can determine whether passing vehicle of each gate sentry in each period compares, if certain is for the moment Between passing vehicle is relatively more in section, there may be the vehicles for needing to be uploaded to host computer and being verified in these vehicles so that under The interaction of position machine and host computer may increase, i.e., amount of communication data can be relatively high.
Access control system provided by the present application still increases information of vehicles newly by the preparatory typing of host computer, then will be increased newly by host computer Information of vehicles is issued to each slave computer.If newly-increased information of vehicles is issued to slave computer in the amount of communication data high period, can increase Add the interaction pressure between host computer and slave computer, therefore the application in the amount of communication data low period, i.e. low ebb passes through the period, it will The newly-increased information of vehicles is issued to the slave computer.
Newly-increased information of vehicles is issued to the slave computer by host computer, specifically includes the following steps:
Step 201, the host computer obtains the logical of slave computer after the second clearance instruction is issued to slave computer The letter data amount low period.
It in the step, is recorded, can determine the amount of communication data of each gate sentry low period and led to according to history passing vehicle The row data volume high period in the local database by the storage of period corresponding to each gate sentry enables slave computer from local The current data volume low period is directly acquired in database.
Step 202, the host computer judges whether current time is in the amount of communication data low period of the slave computer.Such as Fruit is to execute the operation of step 203, if it is not, the operation that pause issues.
Step 203, if so, the newly-increased information of vehicles is issued to slave computer by the host computer.
The newly-increased information of vehicles is stored in by slave computer after receiving the newly-increased information of vehicles that the host computer issues Local data base, and by the history information of vehicles stored in the newly-increased information of vehicles and local data base collectively as local Information of vehicles.
Newly-increased vehicle is issued to slave computer using preset communication protocol by host computer, in the communication protocol, will under The newly-increased vehicle for being sent to same slave computer is packaged, and the newly-increased information of vehicles after packing is issued to bottom as a communication instruction Machine, every communication instruction can guarantee the integrality of data with 03 ending of the beginning of the decimal system 02 in this way.In addition, It is provided in communication protocol, the interaction between upper computer and lower computer needs to carry out secondary handshake operation.
In the application, since host computer is in the data traffic low period, the newly-increased information of vehicles of preparatory typing is issued to Slave computer, therefore whether synchronized according to newly-increased information of vehicles, the newly-increased information of vehicles in host computer can be divided into two classes, Yi Leishi It has been synchronized to slave computer;Another kind of is not to be synchronized to slave computer.To distinguish the newly-increased information of vehicles, host computer is new in storage When increasing information of vehicles, except primary words such as license plate number, vehicle pass-through period, vehicle attribute and the identity informations of driver Section, it is also necessary to be further added by vehicle and issue Success Flag bit field.The newly-increased information of vehicles of host computer storage specifically includes following step It is rapid:
Step 301, the host computer is in searching host computer database with the presence or absence of identical with the identification information new Before increasing information of vehicles, newly-increased information of vehicles is obtained;
Step 302, the host computer establishes information of vehicles table in the host computer database, and the information of vehicles table is for depositing Store up the newly-increased information of vehicles;
Step 303, the host computer is to increase information of vehicles described in each item newly to establish synchronous shape in the information of vehicles table State label, and set not synchronous for the initial synchronisation status indication of the newly-increased information of vehicles.
Optionally, slave computer is used for after the newly-increased information of vehicles is stored in local data base, to described upper Machine sends storage successfully instruction;
The host computer is used to send storage successfully instruction according to the host computer, by the same of the newly-increased information of vehicles Step status indication is changed to synchronize.
Fig. 3 is a kind of second of embodiment of access control system provided by the embodiments of the present application, the workflow of the system Journey the following steps are included:
Step 401, slave computer obtains the identification information of vehicle to be verified.
Step 402, slave computer is searched in local data base with the presence or absence of local vehicle letter identical with the identification information Breath.
Step 403, if there is local information of vehicles identical with the identification information in local data base, slave computer is raw It lets pass and instructs at first.
Step 404, if there is no local information of vehicles identical with the identification information, slave computers in local data base The identification information is uploaded to host computer.
Step 405, the host computer is searched in host computer database with the presence or absence of identical with the identification information newly-increased Information of vehicles.
Step 406, if there is newly-increased information of vehicles identical with the identification information, institute in the host computer database It states host computer and generates the second clearance instruction.
Step 407, the host computer, which lets pass to instruct described second, is issued to slave computer.
Step 408, slave computer is after receiving the second clearance instruction that the host computer issues, by the identification information It is added to local data base.
Before step 408, identification information is that Car license recognition camera is sent to slave computer, and slave computer again believes the identification Breath is sent to host computer, there are the corresponding newly-increased information of vehicles of the identification information in host computer, i.e., the identification information it is corresponding to Verification vehicle belongs to the vehicle that can be let pass, and there are no the storage identification informations in slave computer at this time, therefore this step will identify Information is stored in local data base, as local information of vehicles.In this way, if the corresponding vehicle to be verified of the identification information is under When once passing through this gate sentry, slave computer can identify described to be verified according to the local information of vehicles stored in local data base Vehicle.
In the case, host computer is in the amount of communication data low period of the gate sentry, by the corresponding newly-increased vehicle of identification information When information is issued to slave computer, slave computer again merges newly-increased information of vehicles with the identification information stored before.
Step 409, slave computer according to the history vehicle pass-through of each node record, obtain current time and it is described under For position machine apart from nearest backup node, the backup node is in the amount of communication data low period at current time.
Step 4010, the identification information is sent to the backup node by slave computer.
Vehicle to be verified may leave factory from first outlet within a short period of time after first entrance enters plant area Area.It, can be with according to the operation of step 401 to step 407 if the corresponding slave computer of first entrance does not store the identification information It lets pass the vehicle to be verified.Whithin a period of time, if the corresponding slave computer of first outlet is constantly in amount of communication data height Period, then the corresponding slave computer of first outlet is still not received by newly-increased information of vehicles corresponding with the identification information, herein In the case of, the corresponding vehicle of the identification information is when leaving plant area by first outlet, it is still desirable to according to step 401 to step 407 operation verifies vehicle, causes vehicle identification process relatively complicated.
To solve the above-mentioned problems, the embodiment of the present application provides a kind of access control system, and identification information is sent to by slave computer Backup node, in this way, even if the corresponding newly-increased information of vehicles of identification information is not issued to the backup node by host computer, When vehicle leaves plant area by the corresponding gate sentry of backup node, still the verification to vehicle can be locally completed, to improve The efficiency of verification.
Wherein step 401 to step 407 concrete operations process and step 101 to step 101 concrete operations process one Cause, can cross-reference, therefore not to repeat here for the embodiment of the present application.
Fig. 4 provides a kind of the third embodiment of access control system, the workflow of the system for the embodiment of the present application The following steps are included:
Step 501, slave computer obtains the identification information of vehicle to be verified.
Step 502, slave computer is searched in local data base with the presence or absence of local vehicle letter identical with the identification information Breath.
Step 503, if there is no local information of vehicles identical with the identification information, slave computers in local data base Obtain the identity information of the driver of vehicle to be verified.
The embodiment of the present application is provided with card reader at gate sentry, and card reader is used to read the identity information of driver, example Such as, the card number of the ID card No. and IC card of driver.
Step 504, slave computer is searched in local data base and is believed with the presence or absence of National Officer corresponding with the identity information Breath.
If it does, executing the operation of step 505;If it does not, the identity information is uploaded to host computer, by upper Position machine judges whether the vehicle to be verified of letting pass.
Step 505, if it does, slave computer generates third clearance instruction, with the vehicle to be verified of letting pass.
If the license plate of vehicle to be verified is defaced, Car license recognition camera can not obtain identification information, alternatively, getting mistake Identification information accidentally, at this point, even if slave computer is stored with the corresponding local information of vehicles of the vehicle to be verified, due to identification information Wrong, the instruction for the vehicle to be verified of letting pass can not be generated by still resulting in slave computer.Therefore the embodiment of the present application provides one kind Access control system, the system are obtained the identity information of driver, are believed using the identity when slave computer can not make clearance instruction Breath carry out vehicle verification, avoid due to slave computer obtain identification information it is wrong, caused by can not make let pass instruction Problem.
Wherein, step 501 is consistent to the concrete operations of step 502 and the concrete operations of step 101 to step 102, can phase Mutual reference, therefore not to repeat here for the embodiment of the present application.
Fig. 5 provides a kind of the 4th kind of embodiment of access control system, the workflow of the system for the embodiment of the present application The following steps are included:
Step 601, slave computer obtains the identification information of vehicle to be verified.
Step 602, slave computer is searched in local data base with the presence or absence of local vehicle letter identical with the identification information Breath.
Step 603, if there is no local information of vehicles identical with the identification information, slave computers in local data base Obtain the nameplate photo of the vehicle to be verified.
Step 604, slave computer extracts the unique tag serial number in the nameplate photo.
In the step, unique tag serial number is vin (Vehicle Identification Number, the vehicle of vehicle Identification number or cycle serial number) code, be one group by 17 English arrays at, one group of unique number on automobile, It can identify the data such as manufacturer, engine, chassis serial number and other performances of automobile.In addition to trailer and motorcycle, nameplate should be consolidated It is scheduled on the pillar on one of door hinge column, door lock column or door side for being engaged with door lock column, close to the place at driver seat; If available without such place, it is fixed on the left side of instrument board.If the left side of instrument board can not utilize, Gu It is scheduled on the place on the inside of car door close to operating seat.In addition, the position of nameplate should not moved other than the car door of outside Any part of vehicle can be easy the place read.
Step 605, slave computer, which is searched, whether there is mobile phone corresponding with the unique tag serial number in local data base Number.
If it does, executing the operation of step 606;If it does not, the unique tag serial number is uploaded to upper Machine judges whether the vehicle to be verified of letting pass by host computer.
Step 606, if it does, slave computer sends the chain with default identifying code to the corresponding mobile phone of the phone number It connects.
Step 607, slave computer obtains the target verification code shown in the driver of the vehicle to be verified, and described in judgement Whether target verification code matches with the default identifying code.
If it does, executing the operation of step 608;If mismatched, forbidden instruction is generated, to forbid the vehicle to be verified Passage.
Step 608, if it does, slave computer generates the 4th clearance instruction, with the vehicle to be verified of letting pass.
If the license plate of vehicle to be verified is defaced, Car license recognition camera can not obtain identification information, alternatively, getting mistake Identification information accidentally, at this point, even if slave computer is stored with the corresponding local information of vehicles of the vehicle to be verified, due to identification information Wrong, the instruction for the vehicle to be verified of letting pass can not be generated by still resulting in slave computer.Therefore the embodiment of the present application provides one kind Embodiment in the 4th of access control system, the system obtain vehicle to be verified only when slave computer can not make clearance instruction One mark sequence number, the verification of vehicle is carried out using the unique tag serial number, avoids the identification information obtained due to slave computer It is wrong, caused by can not make clearance instruction the problem of.
Wherein, step 601 is consistent to the concrete operations of step 602 and the concrete operations of step 101 to step 102, can phase Mutual reference, therefore not to repeat here for the embodiment of the present application.
It is required that those skilled in the art can be understood that the technology in the embodiment of the present invention can add by software The mode of general hardware platform realize.Based on this understanding, the technical solution in the embodiment of the present invention substantially or Say that the part that contributes to existing technology can be embodied in the form of software products, which can deposit Storage is in storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions are used so that computer equipment (can be with It is personal computer, server or the network equipment etc.) execute certain part institutes of each embodiment of the present invention or embodiment The method stated.
Combine detailed description and exemplary example that the application is described in detail above, but these explanations are simultaneously It should not be understood as the limitation to the application.It will be appreciated by those skilled in the art that without departing from the application spirit and scope, A variety of equivalent substitution, modification or improvements can be carried out to technical scheme and embodiments thereof, these each fall within the application In the range of.The protection scope of the application is determined by the appended claims.

Claims (9)

1. a kind of access control system, which is characterized in that the system comprises multiple nodes, control node open and close slave computer and with The host computer of slave computer network connection, wherein
Slave computer is used to obtain the identification information of vehicle to be verified;
Slave computer is for searching in local data base with the presence or absence of local information of vehicles identical with the identification information;
If there is local information of vehicles identical with the identification information in local data base, slave computer is put for generating first Row instruction;
If there is no local information of vehicles identical with the identification information in local data base, slave computer is used for the knowledge Other information is uploaded to host computer;
The host computer is for searching in host computer database with the presence or absence of newly-increased information of vehicles identical with the identification information;
If there is newly-increased information of vehicles identical with the identification information in the host computer database, the host computer is used for Generate the second clearance instruction;
The host computer, which is used to that described second to let pass to instruct, is issued to slave computer;
Slave computer is used to let pass according to described second and instruct, and control node is opened, with the vehicle to be verified of letting pass.
2. system according to claim 1, which is characterized in that
The host computer is used for after the second clearance instruction is issued to slave computer, by the newly-increased information of vehicles logical The letter data amount low period, it is issued to the slave computer.
3. system according to claim 1, which is characterized in that
The host computer is used for after the second clearance instruction is issued to slave computer, obtains the amount of communication data of slave computer The low period;
The host computer is for judging whether current time is in the amount of communication data low period of the slave computer;
If so, the host computer is used to the newly-increased information of vehicles being issued to slave computer.
4. system according to claim 2 or 3, which is characterized in that
Slave computer is for receiving the newly-increased information of vehicles that the host computer issues;
Slave computer is used to the newly-increased information of vehicles being stored in local data base;
The history information of vehicles that slave computer is used to store in the newly-increased information of vehicles and local data base is collectively as this Ground information of vehicles.
5. system according to claim 4, which is characterized in that
Slave computer be used for after the newly-increased information of vehicles is stored in local data base, Xiang Suoshu host computer send storage at The instruction of function;
The host computer is used to send storage successfully instruction according to the host computer, by the synchronization shape of the newly-increased information of vehicles State label is changed to synchronize.
6. system according to claim 1, which is characterized in that
The host computer is used in searching host computer database with the presence or absence of newly-increased vehicle letter identical with the identification information Before breath, newly-increased information of vehicles is obtained;
For the host computer for establishing information of vehicles table in the host computer database, the information of vehicles table is described new for storing Increase information of vehicles;
The host computer be used in the information of vehicles table be information of vehicles is increased described in each item newly to establish synchronous regime label, and Set not synchronous for the initial synchronisation status indication of the newly-increased information of vehicles.
7. system according to claim 1, which is characterized in that
Slave computer is used for after receiving the second clearance instruction that the host computer issues, and the identification information is added to this Ground database;
Slave computer is used to be recorded according to the history vehicle pass-through of each node, obtains current time and the slave computer distance Nearest backup node, the backup node are in the amount of communication data low period at current time;
Slave computer is used to the identification information being sent to the backup node.
8. system according to claim 1, which is characterized in that
If there is no local information of vehicles identical with the identification information in local data base, slave computer be also used to obtain to Verify the identity information of the driver of vehicle;
Slave computer is for searching in local data base with the presence or absence of National Officer's information corresponding with the identity information;
If it does, slave computer is instructed for generating third clearance, with the vehicle to be verified of letting pass.
9. system according to claim 1, which is characterized in that
If there is no local information of vehicles identical with the identification information in local data base, slave computer is also used to obtain institute State the nameplate photo of vehicle to be verified;
Slave computer is used to extract the unique tag serial number in the nameplate photo;
Slave computer is for searching in local data base with the presence or absence of phone number corresponding with the unique tag serial number;
If it does, slave computer is used to send the link with default identifying code to the corresponding mobile phone of the phone number;
Slave computer is used to obtain the target verification code shown in the driver of the vehicle to be verified, and judges the target verification Whether code matches with the default identifying code;
If it does, slave computer is instructed for generating the 4th clearance, with the vehicle to be verified of letting pass.
CN201910637943.8A 2019-07-16 2019-07-16 A kind of access control system Pending CN110288744A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910637943.8A CN110288744A (en) 2019-07-16 2019-07-16 A kind of access control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910637943.8A CN110288744A (en) 2019-07-16 2019-07-16 A kind of access control system

Publications (1)

Publication Number Publication Date
CN110288744A true CN110288744A (en) 2019-09-27

Family

ID=68023023

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910637943.8A Pending CN110288744A (en) 2019-07-16 2019-07-16 A kind of access control system

Country Status (1)

Country Link
CN (1) CN110288744A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114462004A (en) * 2022-02-08 2022-05-10 无锡盛景微电子股份有限公司 Method and system for automatically detecting identity information of lower computer in master-slave network

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103701953A (en) * 2013-12-31 2014-04-02 北京智谷睿拓技术服务有限公司 Transmission method and transmission device
CN205140018U (en) * 2015-11-24 2016-04-06 深圳市赛菲姆科技有限公司 Channel controller based on license plate number realizes parkking and charges
CN107067478A (en) * 2017-03-29 2017-08-18 广州群安电子科技有限公司 A kind of parking charging method and system
CN206946708U (en) * 2017-07-07 2018-01-30 北京中全清茂科技发展有限公司 Off line Vehicle License Plate Recognition System
CN107862752A (en) * 2017-10-11 2018-03-30 西安艾润物联网技术服务有限责任公司 Banister control method, system and computer-readable recording medium
CN108038925A (en) * 2017-12-13 2018-05-15 广州华工信息软件有限公司 A kind of expressway tol lcollection method, device, equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103701953A (en) * 2013-12-31 2014-04-02 北京智谷睿拓技术服务有限公司 Transmission method and transmission device
CN205140018U (en) * 2015-11-24 2016-04-06 深圳市赛菲姆科技有限公司 Channel controller based on license plate number realizes parkking and charges
CN107067478A (en) * 2017-03-29 2017-08-18 广州群安电子科技有限公司 A kind of parking charging method and system
CN206946708U (en) * 2017-07-07 2018-01-30 北京中全清茂科技发展有限公司 Off line Vehicle License Plate Recognition System
CN107862752A (en) * 2017-10-11 2018-03-30 西安艾润物联网技术服务有限责任公司 Banister control method, system and computer-readable recording medium
CN108038925A (en) * 2017-12-13 2018-05-15 广州华工信息软件有限公司 A kind of expressway tol lcollection method, device, equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114462004A (en) * 2022-02-08 2022-05-10 无锡盛景微电子股份有限公司 Method and system for automatically detecting identity information of lower computer in master-slave network
CN114462004B (en) * 2022-02-08 2023-08-22 无锡盛景微电子股份有限公司 Method and system for automatically detecting lower-level machine body information in master-slave network

Similar Documents

Publication Publication Date Title
CN108520464B (en) Real-time automatic supervision reporting system based on traditional block chain
CN1866214B (en) Installation method and apparatus
CN103914986A (en) Method and device for fake-license-plate analysis
CN103713736A (en) Device movement track based information recognition method
CN104572644A (en) Database updating device and database updating method
CN110288744A (en) A kind of access control system
CN112418767B (en) Multi-link article tracking method based on blockchain and RFID
CN110389985A (en) Verification of data method, apparatus, computer equipment and storage medium
CN110458399A (en) Risk information generation method, device, computer equipment and storage medium
CN107563634A (en) A kind of method of explosion supervisory systems and explosion supervision based on dipper system
CN102609502A (en) Method and system for mobile terminal desktop searching based on log mode
US20040193588A1 (en) Database search information output method
CN106856585A (en) Set up the method and device of short-distance wireless passage
CN104156430A (en) Device and method for fast extracting Android mobile phone data
CN203216393U (en) Digital-electronic-detonator initiation system capable of identifying position of blast hole
CN105701376A (en) Intelligent terminal combination unlock method and intelligent terminal
CN110322607B (en) Access control system and control method
CN105530125A (en) Internetwork data exchange system
CN102103514A (en) Method for analyzing security demand based on activity graph expansion under CC (Common Criteria)
DE102006021382B4 (en) Personalization of portable data carriers
CN104820916A (en) Intelligent warehouse system and use method
CN111061579A (en) Method and system for transferring information of intelligent cabinet driven by multi-state machine events
CN111061785A (en) Method and system for classified storage of orders in management platform
CN111563127A (en) Implementation method for synchronizing cloud face photo to face recognition device
CN109686015A (en) Book borrowing and reading management method and system in a kind of unmanned Smart library

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190927