CN110443912A - A kind of access control management method, device and terminal device - Google Patents

A kind of access control management method, device and terminal device Download PDF

Info

Publication number
CN110443912A
CN110443912A CN201810408637.2A CN201810408637A CN110443912A CN 110443912 A CN110443912 A CN 110443912A CN 201810408637 A CN201810408637 A CN 201810408637A CN 110443912 A CN110443912 A CN 110443912A
Authority
CN
China
Prior art keywords
user
facial image
terminal
gate inhibition
dimensional code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810408637.2A
Other languages
Chinese (zh)
Inventor
吴建雄
刘馨
洪坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Luckystar Polytron Technologies Inc
Original Assignee
Shenzhen Luckystar Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Luckystar Polytron Technologies Inc filed Critical Shenzhen Luckystar Polytron Technologies Inc
Priority to CN201810408637.2A priority Critical patent/CN110443912A/en
Publication of CN110443912A publication Critical patent/CN110443912A/en
Pending legal-status Critical Current

Links

Abstract

The present invention is suitable for entrance guard management technical field, provides a kind of access control management method, device and terminal device, wherein method includes: the facial image for obtaining the image data of the first user and identifying the first user described in the image data;Judge whether the facial image of first user and the facial image that databases are stored up are consistent;If the facial image of first user is consistent with facial image any in database, opening gate.The present invention passes through the facial image for obtaining the image data of the first user and identifying the first user in image data, judge whether the facial image of the first user and the facial image that databases are stored up are consistent, determine that the first user is registered user, it is opened or closed according to judging result access control, realize efficient entrance guard management mode, it can eliminate safe hidden trouble, improve the safety of user.

Description

A kind of access control management method, device and terminal device
Technical field
The invention belongs to entrance guard management technical field more particularly to a kind of access control management methods, device and terminal device.
Background technique
With the improvement of people ' s living standards with the development of science and technology, each neck that more and more intellectual products are gone into the thick of life Domain, the safety that people are improved using science and technology is the most wide one aspect of demand.
Existing entrance guard management mode, be usually all by means such as electronic lock, coded locks come the unlatching of access control and It closes, there are some potential safety problemss, not can guarantee the safety of user.
Summary of the invention
In view of this, the embodiment of the invention provides a kind of access control management method, device and terminal device, it is existing to solve There are some potential safety problemss for entrance guard management mode in technology, not can guarantee the problem of the safety of user.
The first aspect of the embodiment of the present invention provides a kind of access control management method, comprising:
Obtain the image data of the first user;
Identify the facial image of the first user described in the image data;
Judge whether the facial image of first user and the facial image that databases are stored up are consistent;
If the facial image of first user is consistent with facial image any in database, opening gate.
Optionally, after judging whether the facial image is consistent with the facial image of databases storage, comprising:
If face images are all inconsistent in the facial image and database of first user, to second user Terminal issues alert notification;
It obtains the verification information of the input of first user and the terminal for being sent to second user is verified;
If receive the second user terminal send be verified information, according to the verification information generate pair The gate inhibition's two dimensional code answered, gate inhibition's two dimensional code are used to limit the discrepancy of first user.
Optionally, it obtains the verification information of the input of first user and the terminal for being sent to second user is verified Later, comprising:
Obtain the mark information of the second user input of the terminal transmission of the second user;
The facial image of first user is marked according to the mark information, and saves the face figure of first user As to database.
Optionally, after the mark information for obtaining the second user input of the terminal transmission of the second user, comprising:
Analyze the mark information;
If the mark information is suspicious information, when the corresponding facial image of the mark information is identified again, It sends a warning to the terminal of the second user;
It obtains current location information and is sent to the terminal of the second user.
Optionally, then after generating corresponding gate inhibition's two dimensional code according to the verification information, comprising:
Gate inhibition's two dimensional code is sent to the terminal of first user;
When getting gate inhibition's two dimensional code that the terminal of first user is shown, the terminal for verifying first user is shown Gate inhibition's two dimensional code it is whether correct;
If gate inhibition's two dimensional code is correct, opening gate.
The second aspect of the embodiment of the present invention provides a kind of gate inhibition management apparatus, comprising:
First obtains module, for obtaining the image data of the first user;
Identification module, for identification facial image of the first user described in the image data;
Judgment module, for judge first user facial image and databases storage facial image whether one It causes;
Control module is opened if the facial image for first user is consistent with facial image any in database Open gate inhibition.
The third aspect of the embodiment of the present invention provides a kind of terminal device, comprising: memory, processor and is stored in In the memory and the computer program that can run on the processor, when the processor executes the computer program It realizes such as the step of the above method.
The fourth aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage Media storage has computer program, realizes when the computer program is executed by processor such as the step of the above method.
The embodiment of the present invention passes through the face for obtaining the image data of the first user and identifying the first user in image data Image, whether the facial image for judging that the facial image of the first user and databases are stored up is consistent, determines that the first user is not It is registered user, is opened or closed according to judging result access control, realizes efficient entrance guard management mode, peace can be eliminated Full hidden danger improves the safety of user.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only of the invention some Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these Attached drawing obtains other attached drawings.
Fig. 1 is the flow diagram for the access control management method that the embodiment of the present invention one provides;
Fig. 2 is the flow diagram of access control management method provided by Embodiment 2 of the present invention;
Fig. 3 is the flow diagram for the access control management method that the embodiment of the present invention three provides;
Fig. 4 is the structural schematic diagram for the gate inhibition management apparatus that the embodiment of the present invention four provides;
Fig. 5 is the structural schematic diagram for the gate inhibition management apparatus that the embodiment of the present invention five provides;
Fig. 6 is the structural schematic diagram for the gate inhibition management apparatus that the embodiment of the present invention six provides;
Fig. 7 is the schematic diagram for the terminal device that the embodiment of the present invention seven provides.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical solution in the embodiment of the present invention are explicitly described, it is clear that described embodiment is the present invention one The embodiment divided, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not doing Every other embodiment obtained under the premise of creative work out, should fall within the scope of the present invention.
Description and claims of this specification and term " includes " and their any deformations in above-mentioned attached drawing, meaning Figure, which is to cover, non-exclusive includes.Such as process, method or system comprising a series of steps or units, product or equipment do not have It is defined in listed step or unit, but optionally further comprising the step of not listing or unit, or optionally also wrap Include the other step or units intrinsic for these process, methods, product or equipment.In addition, term " first ", " second " and " third " etc. is for distinguishing different objects, not for description particular order.
In order to illustrate technical solutions according to the invention, the following is a description of specific embodiments.
Embodiment one
As shown in Figure 1, this method can be applied to automatic access control the present embodiment provides a kind of access control management method The terminal devices such as device, attendance gate inhibition's all-in-one machine.Access control management method provided by the present embodiment, comprising:
S101, the image data for obtaining the first user.
In a particular application, the camera for controlling safety and protection monitoring management system is used currently rest in front of gate inhibition first Family is shot, and the image data of the first user is obtained, and image data verifies the identity of the first user for identification.Wherein, shadow It can also include for carrying out pupil, iris as data may include the image datas such as photo, the video of the first user of shooting Identify that pupil image data, iris image of verifying etc. includes the image data of face biological characteristic.
The facial image of first user described in S102, the identification image data.
In a particular application, the image data taken is analyzed, the people in image data is identified by face recognition technology Face image obtains the facial image of the first user.Wherein, the first user includes the one or more currently rested in front of gate inhibition User.
Whether S103, the facial image for judging that the facial image of first user and databases are stored up are consistent.
In a particular application, it searches and whether is stored with and the consistent face figure of the facial image of the first user in database Picture specifically can will store facial image and successively carry out face biology spy with the facial image of the first user in database Whether sign compares, consistent with the facial image for judging that the facial image of the first user and databases are stored up.Wherein, database packet Include the memory space of local storage space, cloud storage space or other external equipments.
If the facial image of S104, first user are consistent with facial image any in database, opening gate.
In a particular application, if found in database with the first consistent facial image of user's facial image, First user of so camera shooting is registered user, then access control is opened, and the first user is allowed to enter currently Entrance guard management region.Can preset registered user have opening gate permission, also can be set registered user into Permission with opening gate after second of certification of row, such as: registered user, which needs to input, enters and leaves password or progress sound Identification, can have the permission of opening gate after being identified by.
The present embodiment passes through the image data by obtaining the first user and identifies the face of the first user in image data Image, whether the facial image for judging that the facial image of the first user and databases are stored up is consistent, determines that the first user is not It is registered user, is opened or closed according to judging result access control, realizes efficient entrance guard management mode, peace can be eliminated Full hidden danger improves the safety of user.
Embodiment two
As shown in Fig. 2, the present embodiment is the further explanation to the method and step in embodiment one.In the present embodiment, After step S103, comprising:
If S201, first user facial image and database in face images it is all inconsistent, to second The terminal of user issues alert notification.
In a particular application, if the facial image of the first user and databases storage all people's face image all It is inconsistent, then the first user is the unknown subscriber not registered, alert notification, alert notification are sent to second user at this time For reminding second user, the first user currently rested in front of gate inhibition is unregistered unknown subscriber, needs second user It enhances your vigilance, carries out security defense work.Wherein, second user includes the peace for executing monitoring and managing current entrance guard management region Full support personnel.Second user has the permission for Strengthening Safety Management such as registration user information, identity user information.
S202, obtain first user input verification information and be sent to the terminal of second user and verify.
In a particular application, if the first user is unregistered unknown subscriber, the first user of Ying Xiang is shown for receiving The dialog box of verification information, and the verification information that the first user inputs is sent to the terminal of second user to verify.
If what S203, the terminal for receiving the second user were sent is verified information, according to the verification information Corresponding gate inhibition's two dimensional code is generated, gate inhibition's two dimensional code is used to limit the discrepancy of first user.
In a particular application, logical according to verifying if receive the transmission of second user terminal is verified information It crosses information and generates corresponding gate inhibition's two dimensional code, the discrepancy of the first user is limited by gate inhibition's two dimensional code.Wherein, gate inhibition's two dimensional code can To include: the control authority of each portal in entrance guard management region, permission of residence time etc. is weighed in entrance guard management region Limit.For example, holding the user of gate inhibition's two dimensional code if setting gate inhibition's two dimensional code can only enter the gate in monitoring management region The region that the security levels such as the teaching building that can not be entered in the functions for residential building or campus of cell by gate inhibition's two dimensional code are more increased; If gate inhibition's two dimensional code, which is arranged, is arranged effective time as 2 hours, hold the user of gate inhibition's two dimensional code in entrance guard management area Residence time should be less than being equal to 2 hours in domain.When user's residence time beyond it is 2 small when, currently hold gate inhibition's two dimensional code User can not will voluntarily enter and leave.Overtime alert notification is sent to second user at this time and is positioned, and second user can press The operation such as safety inspection is carried out to the user for currently holding gate inhibition's two dimensional code according to regulation.
In one embodiment, after step S203, comprising:
Gate inhibition's two dimensional code is sent to the terminal of first user;
When getting gate inhibition's two dimensional code that the terminal of first user is shown, the terminal for verifying first user is shown Gate inhibition's two dimensional code it is whether correct;
If gate inhibition's two dimensional code is correct, opening gate.
In a particular application, after according to the corresponding gate inhibition's two dimensional code of information generation is verified, by gate inhibition's two dimension Code is sent to the terminal of the first user, and the first user can enter and leave the region in extent of competence according to gate inhibition's two dimensional code.Such as Whether consistent with gate inhibition's two dimensional code of setting gate inhibition's two dimensional code that fruit receives then verifies gate inhibition's two dimensional code.If gate inhibition is two-dimentional Code is consistent and has the permission for controlling current gate inhibition, then gate inhibition's two dimensional code is correct gate inhibition's two dimensional code, according to gate inhibition's two dimensional code Access control is opened.If the gate inhibition's two dimensional code received at this time is consistent with gate inhibition's two dimensional code of setting, but this gate inhibition is two-dimentional Code does not have the permission for controlling current gate inhibition, then prompts gate inhibition's two dimensional code mistake to the first user, and gate inhibition remains off.
It in the present embodiment, can also be by the according to being verified after information generates corresponding gate inhibition's two dimensional code One user shows gate inhibition's two dimensional code, the first user by the terminal of the first user scan gate inhibition's two dimensional code and validation information, It is registered, verification information obtains the control authority of gate inhibition after passing through.
The present embodiment is provided to the first user and is set with permission by obtaining the verification information of the first user and verifying The gate inhibition's two dimensional code set efficiently controls unregistered user in the activity in entrance guard management region to limit the discrepancy of the first user Range and activity time can be improved the efficiency of safety management dynamics.
Embodiment three
As shown in figure 3, the present embodiment is the further explanation to the method and step in embodiment one or two.In the present embodiment In, after step S202, comprising:
The mark information for the second user input that S301, the terminal for obtaining the second user are sent.
In a particular application, after the verification information that the first user inputs being sent to the terminal of second user, the is obtained The mark information that the terminal of two users is sent, wherein mark information refers to that second user is input to pair of the terminal of second user The identity marks information of first user.For example, the first user of label is non-a suspect if the first user is courier, this When can add the second mark information be courier.If the first user is suspect, verified for rushing into gate inhibition The people of management region history or other people that may have the person or property to threaten to other users in gate inhibition's management region, then mark Remember that the first user is a suspect.Mark information can be added multiple labelling information to the first user according to the actual situation Setting, for distinguishing the first user of different security levels.
S302, the facial image that first user is marked according to the mark information, and save first user's Facial image is to database.
In a particular application, the mark information sent according to the terminal of second user carries out the facial image of the first user Label, and save with markd facial image to database.
In one embodiment, after step S301, comprising:
Analyze the mark information;
If the mark information is suspicious information, when the corresponding facial image of the mark information is identified again, It sends a warning to the terminal of the second user;
It obtains current location information and is sent to the terminal of the second user.
In a particular application, the mark information received is analyzed, if being suspicious information according to mark information, currently User may make Che Rensheng or property to other users in gate inhibition's management region and threaten, when again identifying that mark information is suspicious It when the corresponding facial image of information, should send a warning to the terminal of second user, and it is corresponding to obtain alarm mark information Facial image user location information, and be sent to the terminal of second user.Warning information for notifying second user, when Preceding terminal recognition goes out to have a suspect's appearance, should improve the Prevention-Security etc. of each gate inhibition in access control management region immediately Grade, quickly goes to a suspect site, guarantees the life and property safety of other users.
In the present embodiment, when the corresponding facial image of the mark information is identified again, Xiang Suoshu second user Terminal send a warning after, can control the corresponding people of other cameras tracking suspicious information with present terminal connection The user of face image can effectively improve the speed that second user goes to the first user position.
The present embodiment adds different mark informations by the first user to different security levels, recognizes mark information For suspicious information facial image when sound an alarm and positioned, can effectively realize and safety etc. is carried out to unregistered user The differentiation of grade, facilitates second user to the management in region, has further ensured the safety of the region inner region people.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
Example IV
As shown in figure 4, the present embodiment provides a kind of gate inhibition management apparatus 100, for executing the step of the method in embodiment one Suddenly.Gate inhibition management apparatus 100 provided in this embodiment, comprising:
First obtains module 101, for obtaining the image data of the first user;
Identification module 102, for identification facial image of the first user described in the image data;
Judgment module 103, the facial image for judging that the facial image of first user is stored up with databases are It is no consistent;
Control module 104, if the facial image for first user is consistent with facial image any in database, Opening gate.
The present embodiment passes through the image data by obtaining the first user and identifies the face of the first user in image data Image, whether the facial image for judging that the facial image of the first user and databases are stored up is consistent, determines that the first user is not It is registered user, is opened or closed according to judging result access control, realizes efficient entrance guard management mode, peace can be eliminated Full hidden danger improves the safety of user.
Embodiment five
As shown in figure 5, in the present embodiment, the gate inhibition management apparatus 100 in example IV further includes for executing implementation In example two method and step with flowering structure:
Alarm module 201, if all different for face images in the facial image and database of first user It causes, then issues alert notification to the terminal of second user;
Second obtains module 202, for obtaining the verification information of the input of first user and being sent to second user Terminal verified;
Receiving module 203, if the terminal for receiving the second user send be verified information, according to institute It states verification information and generates corresponding gate inhibition's two dimensional code, gate inhibition's two dimensional code is used to limit the discrepancy of first user.
In one embodiment, the gate inhibition management apparatus 100, further includes:
Sending module, for sending gate inhibition's two dimensional code to the terminal of first user.
Authentication module, when gate inhibition's two dimensional code that the terminal for getting first user is shown, verifying described first Whether gate inhibition's two dimensional code that the terminal of user is shown is correct;
Opening module, if correct for gate inhibition's two dimensional code, opening gate.
The present embodiment is provided to the first user and is set with permission by obtaining the verification information of the first user and verifying The gate inhibition's two dimensional code set efficiently controls unregistered user in the scope of activities in entrance guard management region to limit the discrepancy of user And the activity time, it can be improved the efficiency of safety management dynamics.
Embodiment six
As shown in fig. 6, in the present embodiment, the gate inhibition management apparatus 100 in example IV or five, further includes for executing In embodiment two method and step with flowering structure:
Third obtains module 301, the label letter for the second user input that the terminal for obtaining the second user is sent Breath;
Memory module 302, for marking the facial image of first user according to the mark information, and described in preservation The facial image of first user is to database.
In one embodiment, the gate inhibition management apparatus 100, further includes:
Analysis module, for analyzing the mark information;
Second sending module, if being suspicious information for the mark information, when the corresponding face of the mark information When image is identified again, the terminal of Xiang Suoshu second user sends a warning;
4th obtains module, for obtaining current location information and being sent to the terminal of the second user.
The present embodiment adds different mark informations by the first user to different security levels, recognizes mark information For suspicious information facial image when sound an alarm and positioned, security level effectively can be carried out to unregistered user It distinguishes, facilitates second user to the management in region, further ensured the safety of the region inner region people.
Embodiment seven
Fig. 7 is the schematic diagram for the terminal device that one embodiment of the invention provides.As shown in fig. 7, the terminal of the embodiment is set Standby 7 include: processor 70, memory 71 and are stored in the meter that can be run in the memory 71 and on the processor 70 Calculation machine program 72, such as entrance guard management program.The processor 70 realizes above-mentioned each door when executing the computer program 72 Prohibit the step in management method embodiment, such as step S101 to S104 shown in FIG. 1.Alternatively, the processor 70 executes institute Realize the function of each module/unit in above-mentioned each Installation practice when stating computer program 72, for example, module 101 shown in Fig. 4 to 104 function.
Illustratively, the computer program 72 can be divided into one or more module/units, it is one or Multiple module/units are stored in the memory 71, and are executed by the processor 70, to complete the present invention.Described one A or multiple module/units can be the series of computation machine program instruction section that can complete specific function, which is used for Implementation procedure of the computer program 72 in the terminal device 7 is described.For example, the computer program 72 can be divided It is cut into the first acquisition module, identification module, judgment module, control module, each module concrete function is as follows:
First obtains module, for obtaining the image data of the first user;
Identification module, for identification facial image of the first user described in the image data;
Judgment module, for judge first user facial image and databases storage facial image whether one It causes;
Control module is opened if the facial image for first user is consistent with facial image any in database Open gate inhibition.
The terminal device 7 can be the calculating such as desktop PC, notebook, palm PC and cloud server and set It is standby.The terminal device may include, but be not limited only to, processor 70, memory 71.It will be understood by those skilled in the art that Fig. 7 The only example of terminal device 7 does not constitute the restriction to terminal device 7, may include than illustrating more or fewer portions Part perhaps combines certain components or different components, such as the terminal device can also include input-output equipment, net Network access device, bus etc..
Alleged processor 70 can be central processing unit (Central Processing Unit, CPU), can also be Other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor Deng.
The memory 71 can be the internal storage unit of the terminal device 7, such as the hard disk or interior of terminal device 7 It deposits.The memory 71 is also possible to the External memory equipment of the terminal device 7, such as be equipped on the terminal device 7 Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), safe digital card (Secure Digital, SD) dodge Deposit card (Flash Card) etc..Further, the memory 71 can also both include the storage inside list of the terminal device 7 Member also includes External memory equipment.The memory 71 is for storing needed for the computer program and the terminal device Other programs and data.The memory 71 can be also used for temporarily storing the data that has exported or will export.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing The all or part of function of description.Each functional unit in embodiment, module can integrate in one processing unit, can also To be that each unit physically exists alone, can also be integrated in one unit with two or more units, it is above-mentioned integrated Unit both can take the form of hardware realization, can also realize in the form of software functional units.In addition, each function list Member, the specific name of module are also only for convenience of distinguishing each other, the protection scope being not intended to limit this application.Above system The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment The part of load may refer to the associated description of other embodiments.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
In embodiment provided by the present invention, it should be understood that disclosed device/terminal device and method, it can be with It realizes by another way.For example, device described above/terminal device embodiment is only schematical, for example, institute The division of module or unit is stated, only a kind of logical function partition, there may be another division manner in actual implementation, such as Multiple units or components can be combined or can be integrated into another system, or some features can be ignored or not executed.Separately A bit, shown or discussed mutual coupling or direct-coupling or communication connection can be through some interfaces, device Or the INDIRECT COUPLING or communication connection of unit, it can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or In use, can store in a computer readable storage medium.Based on this understanding, the present invention realizes above-mentioned implementation All or part of the process in example method, can also instruct relevant hardware to complete, the meter by computer program Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation Code can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer-readable medium It may include: any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic that can carry the computer program code Dish, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that described The content that computer-readable medium includes can carry out increasing appropriate according to the requirement made laws in jurisdiction with patent practice Subtract, such as does not include electric carrier signal and electricity according to legislation and patent practice, computer-readable medium in certain jurisdictions Believe signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (10)

1. a kind of access control management method characterized by comprising
Obtain the image data of the first user;
Identify the facial image of the first user described in the image data;
Judge whether the facial image of first user and the facial image that databases are stored up are consistent;
If the facial image of first user is consistent with facial image any in database, opening gate.
2. access control management method as described in claim 1, which is characterized in that judge described first user's and databases After whether the facial image of storage is consistent, comprising:
If face images are all inconsistent in the facial image and database of first user, to the terminal of second user Issue alert notification;
It obtains the verification information of the input of first user and the terminal for being sent to second user is verified;
If what the terminal for receiving the second user was sent is verified information, generated according to the verification information corresponding Gate inhibition's two dimensional code, gate inhibition's two dimensional code are used to limit the discrepancy of first user.
3. access control management method as claimed in claim 2, which is characterized in that obtain the verifying letter of the input of first user Cease and be sent to second user terminal verified after, comprising:
Obtain the mark information of the second user input of the terminal transmission of the second user;
The facial image of first user is marked according to the mark information, and saves the facial image of first user extremely Database.
4. access control management method as claimed in claim 3, which is characterized in that obtain the terminal of the second user is sent the After the mark information of two users input, comprising:
Analyze the mark information;
If the mark information is suspicious information, when the corresponding facial image of the mark information is identified again, to institute The terminal for stating second user sends a warning;
It obtains current location information and is sent to the terminal of the second user.
5. access control management method as claimed in claim 2, which is characterized in that then generate corresponding door according to the verification information After taboo two dimensional code, comprising:
Gate inhibition's two dimensional code is sent to the terminal of first user;
When getting gate inhibition's two dimensional code that the terminal of first user is shown, the door that the terminal of first user is shown is verified Whether correct prohibit two dimensional code;
If gate inhibition's two dimensional code is correct, opening gate.
6. a kind of gate inhibition management apparatus characterized by comprising
First obtains module, for obtaining the image data of the first user;
Identification module, for identification facial image of the first user described in the image data;
Whether judgment module, the facial image for judging that the facial image of first user and databases are stored up are consistent;
Control module opens door if the facial image for first user is consistent with facial image any in database Prohibit.
7. the gate inhibition management apparatus of personage's tracking as claimed in claim 6, which is characterized in that described device, comprising:
Alarm module, if all inconsistent for face images in the facial image and database of first user, to The terminal of second user issues alert notification;
Second obtains module, for obtain the verification information of the input of first user and be sent to the terminal of second user into Row verifying;
Receiving module, if the terminal for receiving the second user send be verified information, according to the verifying Information generates corresponding gate inhibition's two dimensional code, and gate inhibition's two dimensional code is used to limit the discrepancy of first user.
8. gate inhibition management apparatus as claimed in claim 7, which is characterized in that described device, further includes:
Third obtains module, the mark information for the second user input that the terminal for obtaining the second user is sent;
Memory module for marking the facial image of first user according to the mark information, and saves described first and uses The facial image at family is to database.
9. a kind of terminal device, including memory, processor and storage are in the memory and can be on the processor The computer program of operation, which is characterized in that the processor realizes such as claim 1 to 5 when executing the computer program The step of any one the method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists In when the computer program is executed by processor the step of any one of such as claim 1 to 5 of realization the method.
CN201810408637.2A 2018-05-02 2018-05-02 A kind of access control management method, device and terminal device Pending CN110443912A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810408637.2A CN110443912A (en) 2018-05-02 2018-05-02 A kind of access control management method, device and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810408637.2A CN110443912A (en) 2018-05-02 2018-05-02 A kind of access control management method, device and terminal device

Publications (1)

Publication Number Publication Date
CN110443912A true CN110443912A (en) 2019-11-12

Family

ID=68427027

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810408637.2A Pending CN110443912A (en) 2018-05-02 2018-05-02 A kind of access control management method, device and terminal device

Country Status (1)

Country Link
CN (1) CN110443912A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112037395A (en) * 2020-08-26 2020-12-04 武汉普利商用机器有限公司 Access control method and device, electronic equipment and storage medium
CN112216010A (en) * 2020-10-13 2021-01-12 全播教育科技(广东)有限公司 Campus security management method, system, equipment and storage medium
CN114283511A (en) * 2021-12-27 2022-04-05 上海益邦智能技术股份有限公司 Wisdom garden discrepancy management equipment based on 5G and AI technique
CN115550430A (en) * 2022-09-19 2022-12-30 中国联合网络通信集团有限公司 Method, platform, system and storage medium for monitoring access control abnormity

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104239851A (en) * 2014-07-25 2014-12-24 重庆科技学院 Intelligent cell inspection system based on behavior analysis and control method thereof
CN105869248A (en) * 2016-04-29 2016-08-17 成都千帆科技开发有限公司 Access control cloud management system and method based on face recognition
CN106157407A (en) * 2016-07-05 2016-11-23 孔尧 Intelligent entrance guard control method and device
CN106341422A (en) * 2016-10-31 2017-01-18 深圳中兴网信科技有限公司 Verification method, verification device, terminal, and server
CN106504390A (en) * 2016-11-09 2017-03-15 北京小米移动软件有限公司 Control method for door lock, apparatus and system
KR20180001705A (en) * 2016-06-27 2018-01-05 씨티아이코리아 주식회사 A visitor detection method with face tracking using Haar-Like-Feature in the M2M environment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104239851A (en) * 2014-07-25 2014-12-24 重庆科技学院 Intelligent cell inspection system based on behavior analysis and control method thereof
CN105869248A (en) * 2016-04-29 2016-08-17 成都千帆科技开发有限公司 Access control cloud management system and method based on face recognition
KR20180001705A (en) * 2016-06-27 2018-01-05 씨티아이코리아 주식회사 A visitor detection method with face tracking using Haar-Like-Feature in the M2M environment
CN106157407A (en) * 2016-07-05 2016-11-23 孔尧 Intelligent entrance guard control method and device
CN106341422A (en) * 2016-10-31 2017-01-18 深圳中兴网信科技有限公司 Verification method, verification device, terminal, and server
CN106504390A (en) * 2016-11-09 2017-03-15 北京小米移动软件有限公司 Control method for door lock, apparatus and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
徐挺: "大容量人脸识别门禁系统的研究", 《计算机仿真》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112037395A (en) * 2020-08-26 2020-12-04 武汉普利商用机器有限公司 Access control method and device, electronic equipment and storage medium
CN112216010A (en) * 2020-10-13 2021-01-12 全播教育科技(广东)有限公司 Campus security management method, system, equipment and storage medium
CN114283511A (en) * 2021-12-27 2022-04-05 上海益邦智能技术股份有限公司 Wisdom garden discrepancy management equipment based on 5G and AI technique
CN115550430A (en) * 2022-09-19 2022-12-30 中国联合网络通信集团有限公司 Method, platform, system and storage medium for monitoring access control abnormity
CN115550430B (en) * 2022-09-19 2024-04-09 中国联合网络通信集团有限公司 Monitoring method, platform, system and storage medium for door access abnormality

Similar Documents

Publication Publication Date Title
CN110443912A (en) A kind of access control management method, device and terminal device
CN106412501B (en) A kind of the construction safety behavior intelligent monitor system and its monitoring method of video
CN109165620A (en) A kind of detection method of electric vehicle, system and terminal device
CN109615256A (en) Wisdom garden security protection risk control method, storage medium, electronic equipment and system
CN106895553A (en) Air-conditioning and its control method and device, alarm method and device
CN109547479A (en) Information integration system and method are threatened in a kind of industrial environment
CN110096606B (en) Foreign roll personnel management method and device and electronic equipment
CN109359037A (en) A kind of management method of shared device, storage medium and server
CN106572092A (en) Data transmission method, security integration platform and system
CN109712291A (en) Open method, device and the server of electronic gate
US20220198895A1 (en) Frictionless security processing
US11100788B2 (en) Building alarm system with bayesian event classification
CN110288731A (en) A kind of unlocking method, device and electronic lock
De et al. A refinement approach for the reuse of privacy risk analysis results
CN109542723A (en) A kind of public security department's computer room management system and management method
CN110443913A (en) A kind of access control method, device and terminal device
CN110246250A (en) A kind of laboratory safety access management system
EP3109837A1 (en) System and method of smart incident analysis in control system using floor maps
CN110120114A (en) A kind of human body recognition method based on access control system, system and storage medium
CN109255867A (en) Community's access control management method, device and computer storage medium
CN109460714A (en) Identify the mthods, systems and devices of object
CN115273314A (en) Shelter shield door coordinated control system
CN109215182A (en) A kind of chemical reagent management method and system based on Internet technology
Suresh Kumar et al. Privacy and security of smart systems
CN111767575A (en) Data anti-crawling method, device, equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20191112