CN110288744A - A kind of access control system - Google Patents
A kind of access control system Download PDFInfo
- Publication number
- CN110288744A CN110288744A CN201910637943.8A CN201910637943A CN110288744A CN 110288744 A CN110288744 A CN 110288744A CN 201910637943 A CN201910637943 A CN 201910637943A CN 110288744 A CN110288744 A CN 110288744A
- Authority
- CN
- China
- Prior art keywords
- information
- vehicles
- slave computer
- host computer
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/50—Information retrieval; Database structures therefor; File system structures therefor of still image data
- G06F16/51—Indexing; Data structures therefor; Storage structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/50—Information retrieval; Database structures therefor; File system structures therefor of still image data
- G06F16/58—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
- G06F16/583—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/22—Matching criteria, e.g. proximity measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/60—Type of objects
- G06V20/62—Text, e.g. of license plates, overlay texts or captions on TV images
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/33—Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/38—Individual registration on entry or exit not involving the use of a pass with central registration
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/60—Type of objects
- G06V20/62—Text, e.g. of license plates, overlay texts or captions on TV images
- G06V20/625—License plates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V2201/00—Indexing scheme relating to image or video recognition or understanding
- G06V2201/08—Detecting or categorising vehicles
Abstract
The application provides a kind of access control system, the slave computer opened and closed the system comprises multiple nodes, control node and the host computer with slave computer network connection.Within the system, slave computer is used to obtain the identification information of vehicle to be verified;It searches in local data base with the presence or absence of local information of vehicles identical with the identification information;It is instructed if it does, generating first and letting pass;If it does not, the identification information is uploaded to host computer;The host computer is for searching in host computer database with the presence or absence of newly-increased information of vehicles identical with the identification information;It is instructed if it does, generating second and letting pass;Described second is let pass to instruct and is issued to slave computer.In the peak period of vehicles while passing factory, slave computer is treated verification vehicle in local and is verified, and host computer is just uploaded to when can not locally verify, and the data reduced between slave computer and host computer are transmitted, to improve the working efficiency of access control system.
Description
Technical field
This application involves field of security technologies, and in particular to a kind of access control system.
Background technique
Access control system is applied to the various specific regions for needing to limit personnel or vehicle pass-through, such as plant area or cell etc..
Typical plant area's access control system as shown in Figure 1, include host computer, slave computer, the Car license recognition camera being connected with slave computer and
Limit the banister of vehicle pass-through.When banister of the vehicle to be verified close to gate sentry, Car license recognition camera shoots license plate picture, passes through
It parses license plate picture and obtains the information of vehicles such as license plate number;Slave computer obtains the information of vehicles, using the information of vehicles as to be verified
Information of vehicles is uploaded to host computer;Host computer according to preparatory typing and store information of vehicles of letting pass, it is determined whether let pass with
The vehicle to be verified, and issue pass-through command;Slave computer obtains the pass-through command, controls banister according to the pass-through command
Folding.
For large-scale plant area, as shown in Figure 1, being usually provided with multiple nodes, restricted vehicles while passing is set at node
Gate sentry, that is, there are multiple slave computers, information of vehicles to be verified is uploaded to host computer, is made and being sentenced by host computer by each slave computer
Break and issues pass-through command.In the peak period of vehicles while passing plant area, host computer receives a plurality of information of vehicles to be verified, and will be more
The corresponding pass-through command of item information of vehicles to be verified is issued to each slave computer respectively, will be under multiple pass-through commands in the same period
Massive band width can be occupied by being sent to slave computer, be easy to cause backlog, and the time of pass-through command is received so as to cause slave computer
Delay.
Summary of the invention
The application provides a kind of access control system, to solve existing plant area's access control system at the peak of vehicles while passing plant area
Section, the low problem of working efficiency.
The application provides a kind of access control system, the system comprises multiple nodes, control node open and close slave computer and
With the host computer of slave computer network connection, wherein
Slave computer is used to obtain the identification information of vehicle to be verified;
Slave computer is for searching in local data base with the presence or absence of local information of vehicles identical with the identification information;
If there is local information of vehicles identical with the identification information in local data base, slave computer is for generating the
One, which lets pass, instructs;
If there is no local information of vehicles identical with the identification information in local data base, slave computer is used for institute
It states identification information and is uploaded to host computer;
The host computer is for searching in host computer database with the presence or absence of newly-increased vehicle identical with the identification information
Information;
If there is newly-increased information of vehicles identical with the identification information, the host computer in the host computer database
For generating the second clearance instruction;
The host computer, which is used to that described second to let pass to instruct, is issued to slave computer;
Slave computer is used to let pass according to described second and instruct, and control node is opened, with the vehicle to be verified of letting pass.
Optionally,
The host computer is used for after the second clearance instruction is issued to slave computer, by the newly-increased information of vehicles
In the amount of communication data low period, it is issued to the slave computer.
Optionally,
The host computer is used for after the second clearance instruction is issued to slave computer, obtains the communication number of slave computer
According to the amount low period;
The host computer is for judging whether current time is in the amount of communication data low period of the slave computer;
If so, the host computer is used to the newly-increased information of vehicles being issued to slave computer.
Optionally,
Slave computer is for receiving the newly-increased information of vehicles that the host computer issues;
Slave computer is used to the newly-increased information of vehicles being stored in local data base;
Slave computer for making the history information of vehicles stored in the newly-increased information of vehicles and local data base jointly
For local information of vehicles.
Optionally,
Slave computer is used for after the newly-increased information of vehicles is stored in local data base, and the transmission of Xiang Suoshu host computer is deposited
Storage successfully instruction;
The host computer is used to send storage successfully instruction according to the host computer, by the same of the newly-increased information of vehicles
Step status indication is changed to synchronize.
Optionally,
The host computer is used to whether there is newly-increased vehicle identical with the identification information in searching host computer database
Before information, newly-increased information of vehicles is obtained;
The host computer for establishing information of vehicles table in the host computer database, and the information of vehicles table is for storing institute
State newly-increased information of vehicles;
The host computer is used in the information of vehicles table be to increase information of vehicles described in each item newly to establish synchronous regime mark
Note, and set not synchronous for the initial synchronisation status indication of the newly-increased information of vehicles.
Optionally,
Slave computer is used for after receiving the second clearance instruction that the host computer issues, and the identification information is added
To local data base;
Slave computer is used to be recorded according to the history vehicle pass-through of each node, obtains current time and the slave computer
Apart from nearest backup node, the backup node is in the amount of communication data low period at current time;
Slave computer is used to the identification information being sent to the backup node.
Optionally,
If there is no local information of vehicles identical with the identification information in local data base, slave computer is also used to obtain
Take the identity information of the driver of vehicle to be verified;
Slave computer is for searching in local data base with the presence or absence of National Officer's information corresponding with the identity information;
If it does, slave computer is instructed for generating third clearance, with the vehicle to be verified of letting pass.
Optionally,
If there is no local information of vehicles identical with the identification information in local data base, slave computer is also used to obtain
Take the nameplate photo of the vehicle to be verified;
Slave computer is used to extract the unique tag serial number in the nameplate photo;
Slave computer is for searching in local data base with the presence or absence of phone number corresponding with the unique tag serial number;
If it does, slave computer is used to send the link with default identifying code to the corresponding mobile phone of the phone number;
Slave computer is used to obtain the target verification code shown in the driver of the vehicle to be verified, and judges the target
Whether identifying code matches with the default identifying code;
If it does, slave computer is instructed for generating the 4th clearance, with the vehicle to be verified of letting pass.
From the above technical scheme, the application provides a kind of access control system, and the system comprises multiple nodes, control section
The slave computer of point folding and the host computer being connected to the network with slave computer.Within the system, still through the preparatory typing of host computer
Newly-increased information of vehicles is issued to slave computer by newly-increased information of vehicles, host computer, and slave computer receives and stores newly-increased information of vehicles, this
Sample, slave computer can treat verification vehicle in local and be verified, and the data reduced between slave computer and host computer are transmitted, thus
Improve the working efficiency of access control system.
Detailed description of the invention
In order to illustrate more clearly of the technical solution of the application, letter will be made to attached drawing needed in the embodiment below
Singly introduce, it should be apparent that, for those of ordinary skills, without creative efforts, also
Other drawings may be obtained according to these drawings without any creative labor.
Fig. 1 is the schematic diagram of a scenario for plant area's access control system that the prior art provides;
Fig. 2 is a kind of work flow diagram of access control system provided by the embodiments of the present application;
Fig. 3 is a kind of work flow diagram of second of embodiment of access control system provided by the embodiments of the present application;
Fig. 4 is a kind of work flow diagram of the third embodiment of access control system provided by the embodiments of the present application;
Fig. 5 is a kind of work flow diagram of 4th kind of embodiment of access control system provided by the embodiments of the present application.
Specific embodiment
To solve existing plant area's access control system in the peak period of vehicles while passing plant area, the low problem of working efficiency, sheet
Application provides a kind of access control system.
In order to explain the application, the application is described in detail by the following examples.
Fig. 2 shows a kind of work flow diagrams of access control system provided by the embodiments of the present application, and the system is according to following
Step executes:
Step 101, slave computer obtains the identification information of vehicle to be verified.
In the step, identification information is can to uniquely determine the information of the vehicle to be tested, such as license plate number.Usually
In the case of, Car license recognition camera is provided at gate sentry, when vehicle to be tested drives into the region that Car license recognition camera can identify,
Car license recognition camera captures license plate number automatically, and license plate number is sent to slave computer.
Step 102, slave computer is searched in local data base with the presence or absence of local vehicle letter identical with the identification information
Breath.
If it does, executing the operation of step 103;If it does not, executing the operation of step 104.
Step 103, if there is local information of vehicles identical with the identification information in local data base, slave computer is raw
It lets pass and instructs at first.
In the step, if there is local information of vehicles identical with the identification information in local data base, illustrate institute
State the corresponding vehicle to be released of identification information and belong to the vehicle that can be let pass, therefore generate first and let pass instruction, with let pass it is described to
Verify vehicle.
Step 104, if there is no local information of vehicles identical with the identification information, slave computers in local data base
The identification information is uploaded to host computer.
If whole newly-increased information of vehicles (newly-increased information of vehicles of letting pass) are stored in local data base, at this
Ground database can determine the vehicle to be verified there is no in the case where local information of vehicles identical with the identification information
Belong to the vehicle that can not be let pass.It is not that whole newly-increased information of vehicles is stored in local number but in the embodiment of the present application
It is stored in host computer according to that in library, may there is part to increase information of vehicles newly, it is therefore desirable to be sent to the identification information upper
Machine, and the judgement whether let pass is made by host computer.
Step 105, the host computer is searched in host computer database with the presence or absence of identical with the identification information newly-increased
Information of vehicles.
If it does, executing the operation of step 106.It can not if it does not, can determine that the vehicle to be verified belongs to
The vehicle of clearance generates forbidden instruction, and will carry out instruction and be issued to slave computer.
Step 106, if there is newly-increased information of vehicles identical with the identification information, institute in the host computer database
It states host computer and generates the second clearance instruction.
Step 107, the host computer, which lets pass to instruct described second, is issued to slave computer;
Step 108, slave computer is let pass according to described second and is instructed, and control node is opened, with the vehicle to be verified of letting pass.
From the above technical scheme, the application provides a kind of access control system, and the system comprises multiple nodes, control section
The slave computer of point folding and the host computer being connected to the network with slave computer.Within the system, still through the preparatory typing of host computer
Newly-increased information of vehicles is issued to slave computer by newly-increased information of vehicles, host computer, and slave computer receives and stores newly-increased information of vehicles, this
Sample, slave computer can treat verification vehicle in local and be verified, and the data reduced between slave computer and host computer are transmitted, thus
Improve the working efficiency of access control system.
Access control system provided by the present application includes multiple nodes, the corresponding gate sentry of each node, and for a plant area,
Each gate sentry is due to its responsibility or the difference in geographical location, in different time sections, how much presence of each gate sentry passing vehicle
Difference.For example, the vehicle into plant area is more in work hours section, the gate sentry passing vehicle of corresponding entrance can be relatively more.According to
History vehicle pass-through record it is more to can determine whether passing vehicle of each gate sentry in each period compares, if certain is for the moment
Between passing vehicle is relatively more in section, there may be the vehicles for needing to be uploaded to host computer and being verified in these vehicles so that under
The interaction of position machine and host computer may increase, i.e., amount of communication data can be relatively high.
Access control system provided by the present application still increases information of vehicles newly by the preparatory typing of host computer, then will be increased newly by host computer
Information of vehicles is issued to each slave computer.If newly-increased information of vehicles is issued to slave computer in the amount of communication data high period, can increase
Add the interaction pressure between host computer and slave computer, therefore the application in the amount of communication data low period, i.e. low ebb passes through the period, it will
The newly-increased information of vehicles is issued to the slave computer.
Newly-increased information of vehicles is issued to the slave computer by host computer, specifically includes the following steps:
Step 201, the host computer obtains the logical of slave computer after the second clearance instruction is issued to slave computer
The letter data amount low period.
It in the step, is recorded, can determine the amount of communication data of each gate sentry low period and led to according to history passing vehicle
The row data volume high period in the local database by the storage of period corresponding to each gate sentry enables slave computer from local
The current data volume low period is directly acquired in database.
Step 202, the host computer judges whether current time is in the amount of communication data low period of the slave computer.Such as
Fruit is to execute the operation of step 203, if it is not, the operation that pause issues.
Step 203, if so, the newly-increased information of vehicles is issued to slave computer by the host computer.
The newly-increased information of vehicles is stored in by slave computer after receiving the newly-increased information of vehicles that the host computer issues
Local data base, and by the history information of vehicles stored in the newly-increased information of vehicles and local data base collectively as local
Information of vehicles.
Newly-increased vehicle is issued to slave computer using preset communication protocol by host computer, in the communication protocol, will under
The newly-increased vehicle for being sent to same slave computer is packaged, and the newly-increased information of vehicles after packing is issued to bottom as a communication instruction
Machine, every communication instruction can guarantee the integrality of data with 03 ending of the beginning of the decimal system 02 in this way.In addition,
It is provided in communication protocol, the interaction between upper computer and lower computer needs to carry out secondary handshake operation.
In the application, since host computer is in the data traffic low period, the newly-increased information of vehicles of preparatory typing is issued to
Slave computer, therefore whether synchronized according to newly-increased information of vehicles, the newly-increased information of vehicles in host computer can be divided into two classes, Yi Leishi
It has been synchronized to slave computer;Another kind of is not to be synchronized to slave computer.To distinguish the newly-increased information of vehicles, host computer is new in storage
When increasing information of vehicles, except primary words such as license plate number, vehicle pass-through period, vehicle attribute and the identity informations of driver
Section, it is also necessary to be further added by vehicle and issue Success Flag bit field.The newly-increased information of vehicles of host computer storage specifically includes following step
It is rapid:
Step 301, the host computer is in searching host computer database with the presence or absence of identical with the identification information new
Before increasing information of vehicles, newly-increased information of vehicles is obtained;
Step 302, the host computer establishes information of vehicles table in the host computer database, and the information of vehicles table is for depositing
Store up the newly-increased information of vehicles;
Step 303, the host computer is to increase information of vehicles described in each item newly to establish synchronous shape in the information of vehicles table
State label, and set not synchronous for the initial synchronisation status indication of the newly-increased information of vehicles.
Optionally, slave computer is used for after the newly-increased information of vehicles is stored in local data base, to described upper
Machine sends storage successfully instruction;
The host computer is used to send storage successfully instruction according to the host computer, by the same of the newly-increased information of vehicles
Step status indication is changed to synchronize.
Fig. 3 is a kind of second of embodiment of access control system provided by the embodiments of the present application, the workflow of the system
Journey the following steps are included:
Step 401, slave computer obtains the identification information of vehicle to be verified.
Step 402, slave computer is searched in local data base with the presence or absence of local vehicle letter identical with the identification information
Breath.
Step 403, if there is local information of vehicles identical with the identification information in local data base, slave computer is raw
It lets pass and instructs at first.
Step 404, if there is no local information of vehicles identical with the identification information, slave computers in local data base
The identification information is uploaded to host computer.
Step 405, the host computer is searched in host computer database with the presence or absence of identical with the identification information newly-increased
Information of vehicles.
Step 406, if there is newly-increased information of vehicles identical with the identification information, institute in the host computer database
It states host computer and generates the second clearance instruction.
Step 407, the host computer, which lets pass to instruct described second, is issued to slave computer.
Step 408, slave computer is after receiving the second clearance instruction that the host computer issues, by the identification information
It is added to local data base.
Before step 408, identification information is that Car license recognition camera is sent to slave computer, and slave computer again believes the identification
Breath is sent to host computer, there are the corresponding newly-increased information of vehicles of the identification information in host computer, i.e., the identification information it is corresponding to
Verification vehicle belongs to the vehicle that can be let pass, and there are no the storage identification informations in slave computer at this time, therefore this step will identify
Information is stored in local data base, as local information of vehicles.In this way, if the corresponding vehicle to be verified of the identification information is under
When once passing through this gate sentry, slave computer can identify described to be verified according to the local information of vehicles stored in local data base
Vehicle.
In the case, host computer is in the amount of communication data low period of the gate sentry, by the corresponding newly-increased vehicle of identification information
When information is issued to slave computer, slave computer again merges newly-increased information of vehicles with the identification information stored before.
Step 409, slave computer according to the history vehicle pass-through of each node record, obtain current time and it is described under
For position machine apart from nearest backup node, the backup node is in the amount of communication data low period at current time.
Step 4010, the identification information is sent to the backup node by slave computer.
Vehicle to be verified may leave factory from first outlet within a short period of time after first entrance enters plant area
Area.It, can be with according to the operation of step 401 to step 407 if the corresponding slave computer of first entrance does not store the identification information
It lets pass the vehicle to be verified.Whithin a period of time, if the corresponding slave computer of first outlet is constantly in amount of communication data height
Period, then the corresponding slave computer of first outlet is still not received by newly-increased information of vehicles corresponding with the identification information, herein
In the case of, the corresponding vehicle of the identification information is when leaving plant area by first outlet, it is still desirable to according to step 401 to step
407 operation verifies vehicle, causes vehicle identification process relatively complicated.
To solve the above-mentioned problems, the embodiment of the present application provides a kind of access control system, and identification information is sent to by slave computer
Backup node, in this way, even if the corresponding newly-increased information of vehicles of identification information is not issued to the backup node by host computer,
When vehicle leaves plant area by the corresponding gate sentry of backup node, still the verification to vehicle can be locally completed, to improve
The efficiency of verification.
Wherein step 401 to step 407 concrete operations process and step 101 to step 101 concrete operations process one
Cause, can cross-reference, therefore not to repeat here for the embodiment of the present application.
Fig. 4 provides a kind of the third embodiment of access control system, the workflow of the system for the embodiment of the present application
The following steps are included:
Step 501, slave computer obtains the identification information of vehicle to be verified.
Step 502, slave computer is searched in local data base with the presence or absence of local vehicle letter identical with the identification information
Breath.
Step 503, if there is no local information of vehicles identical with the identification information, slave computers in local data base
Obtain the identity information of the driver of vehicle to be verified.
The embodiment of the present application is provided with card reader at gate sentry, and card reader is used to read the identity information of driver, example
Such as, the card number of the ID card No. and IC card of driver.
Step 504, slave computer is searched in local data base and is believed with the presence or absence of National Officer corresponding with the identity information
Breath.
If it does, executing the operation of step 505;If it does not, the identity information is uploaded to host computer, by upper
Position machine judges whether the vehicle to be verified of letting pass.
Step 505, if it does, slave computer generates third clearance instruction, with the vehicle to be verified of letting pass.
If the license plate of vehicle to be verified is defaced, Car license recognition camera can not obtain identification information, alternatively, getting mistake
Identification information accidentally, at this point, even if slave computer is stored with the corresponding local information of vehicles of the vehicle to be verified, due to identification information
Wrong, the instruction for the vehicle to be verified of letting pass can not be generated by still resulting in slave computer.Therefore the embodiment of the present application provides one kind
Access control system, the system are obtained the identity information of driver, are believed using the identity when slave computer can not make clearance instruction
Breath carry out vehicle verification, avoid due to slave computer obtain identification information it is wrong, caused by can not make let pass instruction
Problem.
Wherein, step 501 is consistent to the concrete operations of step 502 and the concrete operations of step 101 to step 102, can phase
Mutual reference, therefore not to repeat here for the embodiment of the present application.
Fig. 5 provides a kind of the 4th kind of embodiment of access control system, the workflow of the system for the embodiment of the present application
The following steps are included:
Step 601, slave computer obtains the identification information of vehicle to be verified.
Step 602, slave computer is searched in local data base with the presence or absence of local vehicle letter identical with the identification information
Breath.
Step 603, if there is no local information of vehicles identical with the identification information, slave computers in local data base
Obtain the nameplate photo of the vehicle to be verified.
Step 604, slave computer extracts the unique tag serial number in the nameplate photo.
In the step, unique tag serial number is vin (Vehicle Identification Number, the vehicle of vehicle
Identification number or cycle serial number) code, be one group by 17 English arrays at, one group of unique number on automobile,
It can identify the data such as manufacturer, engine, chassis serial number and other performances of automobile.In addition to trailer and motorcycle, nameplate should be consolidated
It is scheduled on the pillar on one of door hinge column, door lock column or door side for being engaged with door lock column, close to the place at driver seat;
If available without such place, it is fixed on the left side of instrument board.If the left side of instrument board can not utilize, Gu
It is scheduled on the place on the inside of car door close to operating seat.In addition, the position of nameplate should not moved other than the car door of outside
Any part of vehicle can be easy the place read.
Step 605, slave computer, which is searched, whether there is mobile phone corresponding with the unique tag serial number in local data base
Number.
If it does, executing the operation of step 606;If it does not, the unique tag serial number is uploaded to upper
Machine judges whether the vehicle to be verified of letting pass by host computer.
Step 606, if it does, slave computer sends the chain with default identifying code to the corresponding mobile phone of the phone number
It connects.
Step 607, slave computer obtains the target verification code shown in the driver of the vehicle to be verified, and described in judgement
Whether target verification code matches with the default identifying code.
If it does, executing the operation of step 608;If mismatched, forbidden instruction is generated, to forbid the vehicle to be verified
Passage.
Step 608, if it does, slave computer generates the 4th clearance instruction, with the vehicle to be verified of letting pass.
If the license plate of vehicle to be verified is defaced, Car license recognition camera can not obtain identification information, alternatively, getting mistake
Identification information accidentally, at this point, even if slave computer is stored with the corresponding local information of vehicles of the vehicle to be verified, due to identification information
Wrong, the instruction for the vehicle to be verified of letting pass can not be generated by still resulting in slave computer.Therefore the embodiment of the present application provides one kind
Embodiment in the 4th of access control system, the system obtain vehicle to be verified only when slave computer can not make clearance instruction
One mark sequence number, the verification of vehicle is carried out using the unique tag serial number, avoids the identification information obtained due to slave computer
It is wrong, caused by can not make clearance instruction the problem of.
Wherein, step 601 is consistent to the concrete operations of step 602 and the concrete operations of step 101 to step 102, can phase
Mutual reference, therefore not to repeat here for the embodiment of the present application.
It is required that those skilled in the art can be understood that the technology in the embodiment of the present invention can add by software
The mode of general hardware platform realize.Based on this understanding, the technical solution in the embodiment of the present invention substantially or
Say that the part that contributes to existing technology can be embodied in the form of software products, which can deposit
Storage is in storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions are used so that computer equipment (can be with
It is personal computer, server or the network equipment etc.) execute certain part institutes of each embodiment of the present invention or embodiment
The method stated.
Combine detailed description and exemplary example that the application is described in detail above, but these explanations are simultaneously
It should not be understood as the limitation to the application.It will be appreciated by those skilled in the art that without departing from the application spirit and scope,
A variety of equivalent substitution, modification or improvements can be carried out to technical scheme and embodiments thereof, these each fall within the application
In the range of.The protection scope of the application is determined by the appended claims.
Claims (9)
1. a kind of access control system, which is characterized in that the system comprises multiple nodes, control node open and close slave computer and with
The host computer of slave computer network connection, wherein
Slave computer is used to obtain the identification information of vehicle to be verified;
Slave computer is for searching in local data base with the presence or absence of local information of vehicles identical with the identification information;
If there is local information of vehicles identical with the identification information in local data base, slave computer is put for generating first
Row instruction;
If there is no local information of vehicles identical with the identification information in local data base, slave computer is used for the knowledge
Other information is uploaded to host computer;
The host computer is for searching in host computer database with the presence or absence of newly-increased information of vehicles identical with the identification information;
If there is newly-increased information of vehicles identical with the identification information in the host computer database, the host computer is used for
Generate the second clearance instruction;
The host computer, which is used to that described second to let pass to instruct, is issued to slave computer;
Slave computer is used to let pass according to described second and instruct, and control node is opened, with the vehicle to be verified of letting pass.
2. system according to claim 1, which is characterized in that
The host computer is used for after the second clearance instruction is issued to slave computer, by the newly-increased information of vehicles logical
The letter data amount low period, it is issued to the slave computer.
3. system according to claim 1, which is characterized in that
The host computer is used for after the second clearance instruction is issued to slave computer, obtains the amount of communication data of slave computer
The low period;
The host computer is for judging whether current time is in the amount of communication data low period of the slave computer;
If so, the host computer is used to the newly-increased information of vehicles being issued to slave computer.
4. system according to claim 2 or 3, which is characterized in that
Slave computer is for receiving the newly-increased information of vehicles that the host computer issues;
Slave computer is used to the newly-increased information of vehicles being stored in local data base;
The history information of vehicles that slave computer is used to store in the newly-increased information of vehicles and local data base is collectively as this
Ground information of vehicles.
5. system according to claim 4, which is characterized in that
Slave computer be used for after the newly-increased information of vehicles is stored in local data base, Xiang Suoshu host computer send storage at
The instruction of function;
The host computer is used to send storage successfully instruction according to the host computer, by the synchronization shape of the newly-increased information of vehicles
State label is changed to synchronize.
6. system according to claim 1, which is characterized in that
The host computer is used in searching host computer database with the presence or absence of newly-increased vehicle letter identical with the identification information
Before breath, newly-increased information of vehicles is obtained;
For the host computer for establishing information of vehicles table in the host computer database, the information of vehicles table is described new for storing
Increase information of vehicles;
The host computer be used in the information of vehicles table be information of vehicles is increased described in each item newly to establish synchronous regime label, and
Set not synchronous for the initial synchronisation status indication of the newly-increased information of vehicles.
7. system according to claim 1, which is characterized in that
Slave computer is used for after receiving the second clearance instruction that the host computer issues, and the identification information is added to this
Ground database;
Slave computer is used to be recorded according to the history vehicle pass-through of each node, obtains current time and the slave computer distance
Nearest backup node, the backup node are in the amount of communication data low period at current time;
Slave computer is used to the identification information being sent to the backup node.
8. system according to claim 1, which is characterized in that
If there is no local information of vehicles identical with the identification information in local data base, slave computer be also used to obtain to
Verify the identity information of the driver of vehicle;
Slave computer is for searching in local data base with the presence or absence of National Officer's information corresponding with the identity information;
If it does, slave computer is instructed for generating third clearance, with the vehicle to be verified of letting pass.
9. system according to claim 1, which is characterized in that
If there is no local information of vehicles identical with the identification information in local data base, slave computer is also used to obtain institute
State the nameplate photo of vehicle to be verified;
Slave computer is used to extract the unique tag serial number in the nameplate photo;
Slave computer is for searching in local data base with the presence or absence of phone number corresponding with the unique tag serial number;
If it does, slave computer is used to send the link with default identifying code to the corresponding mobile phone of the phone number;
Slave computer is used to obtain the target verification code shown in the driver of the vehicle to be verified, and judges the target verification
Whether code matches with the default identifying code;
If it does, slave computer is instructed for generating the 4th clearance, with the vehicle to be verified of letting pass.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910637943.8A CN110288744A (en) | 2019-07-16 | 2019-07-16 | A kind of access control system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910637943.8A CN110288744A (en) | 2019-07-16 | 2019-07-16 | A kind of access control system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110288744A true CN110288744A (en) | 2019-09-27 |
Family
ID=68023023
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910637943.8A Pending CN110288744A (en) | 2019-07-16 | 2019-07-16 | A kind of access control system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110288744A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114462004A (en) * | 2022-02-08 | 2022-05-10 | 无锡盛景微电子股份有限公司 | Method and system for automatically detecting identity information of lower computer in master-slave network |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103701953A (en) * | 2013-12-31 | 2014-04-02 | 北京智谷睿拓技术服务有限公司 | Transmission method and transmission device |
CN205140018U (en) * | 2015-11-24 | 2016-04-06 | 深圳市赛菲姆科技有限公司 | Channel controller based on license plate number realizes parkking and charges |
CN107067478A (en) * | 2017-03-29 | 2017-08-18 | 广州群安电子科技有限公司 | A kind of parking charging method and system |
CN206946708U (en) * | 2017-07-07 | 2018-01-30 | 北京中全清茂科技发展有限公司 | Off line Vehicle License Plate Recognition System |
CN107862752A (en) * | 2017-10-11 | 2018-03-30 | 西安艾润物联网技术服务有限责任公司 | Banister control method, system and computer-readable recording medium |
CN108038925A (en) * | 2017-12-13 | 2018-05-15 | 广州华工信息软件有限公司 | A kind of expressway tol lcollection method, device, equipment and storage medium |
-
2019
- 2019-07-16 CN CN201910637943.8A patent/CN110288744A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103701953A (en) * | 2013-12-31 | 2014-04-02 | 北京智谷睿拓技术服务有限公司 | Transmission method and transmission device |
CN205140018U (en) * | 2015-11-24 | 2016-04-06 | 深圳市赛菲姆科技有限公司 | Channel controller based on license plate number realizes parkking and charges |
CN107067478A (en) * | 2017-03-29 | 2017-08-18 | 广州群安电子科技有限公司 | A kind of parking charging method and system |
CN206946708U (en) * | 2017-07-07 | 2018-01-30 | 北京中全清茂科技发展有限公司 | Off line Vehicle License Plate Recognition System |
CN107862752A (en) * | 2017-10-11 | 2018-03-30 | 西安艾润物联网技术服务有限责任公司 | Banister control method, system and computer-readable recording medium |
CN108038925A (en) * | 2017-12-13 | 2018-05-15 | 广州华工信息软件有限公司 | A kind of expressway tol lcollection method, device, equipment and storage medium |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114462004A (en) * | 2022-02-08 | 2022-05-10 | 无锡盛景微电子股份有限公司 | Method and system for automatically detecting identity information of lower computer in master-slave network |
CN114462004B (en) * | 2022-02-08 | 2023-08-22 | 无锡盛景微电子股份有限公司 | Method and system for automatically detecting lower-level machine body information in master-slave network |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108520464B (en) | Real-time automatic supervision reporting system based on traditional block chain | |
CN1866214B (en) | Installation method and apparatus | |
CN103914986A (en) | Method and device for fake-license-plate analysis | |
CN103713736A (en) | Device movement track based information recognition method | |
CN104572644A (en) | Database updating device and database updating method | |
CN110288744A (en) | A kind of access control system | |
CN112418767B (en) | Multi-link article tracking method based on blockchain and RFID | |
CN110389985A (en) | Verification of data method, apparatus, computer equipment and storage medium | |
CN110458399A (en) | Risk information generation method, device, computer equipment and storage medium | |
CN107563634A (en) | A kind of method of explosion supervisory systems and explosion supervision based on dipper system | |
CN102609502A (en) | Method and system for mobile terminal desktop searching based on log mode | |
US20040193588A1 (en) | Database search information output method | |
CN106856585A (en) | Set up the method and device of short-distance wireless passage | |
CN104156430A (en) | Device and method for fast extracting Android mobile phone data | |
CN203216393U (en) | Digital-electronic-detonator initiation system capable of identifying position of blast hole | |
CN105701376A (en) | Intelligent terminal combination unlock method and intelligent terminal | |
CN110322607B (en) | Access control system and control method | |
CN105530125A (en) | Internetwork data exchange system | |
CN102103514A (en) | Method for analyzing security demand based on activity graph expansion under CC (Common Criteria) | |
DE102006021382B4 (en) | Personalization of portable data carriers | |
CN104820916A (en) | Intelligent warehouse system and use method | |
CN111061579A (en) | Method and system for transferring information of intelligent cabinet driven by multi-state machine events | |
CN111061785A (en) | Method and system for classified storage of orders in management platform | |
CN111563127A (en) | Implementation method for synchronizing cloud face photo to face recognition device | |
CN109686015A (en) | Book borrowing and reading management method and system in a kind of unmanned Smart library |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190927 |