CN110473328A - Community's access control management method and device, storage medium, electronic equipment - Google Patents
Community's access control management method and device, storage medium, electronic equipment Download PDFInfo
- Publication number
- CN110473328A CN110473328A CN201910849663.3A CN201910849663A CN110473328A CN 110473328 A CN110473328 A CN 110473328A CN 201910849663 A CN201910849663 A CN 201910849663A CN 110473328 A CN110473328 A CN 110473328A
- Authority
- CN
- China
- Prior art keywords
- target object
- data
- community
- identification information
- credit score
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/60—Indexing scheme relating to groups G07C9/00174 - G07C9/00944
- G07C2209/63—Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The disclosure provides a kind of community's access control management method and device, electronic equipment, storage medium;It is related to field of artificial intelligence.Community's access control management method includes: to occur target object in target area in response to detecting, obtains the corresponding identification information of the target object;Intellectual analysis processing is carried out to the identification information of the target object, determines the corresponding Permission Levels data of the target object;The corresponding prevailing state data of the target object are determined according to the Permission Levels data, to control the switch state of community gate inhibition by the prevailing state data.The disclosure can make owner, visitor and extraneous services personnel more convenient when passing in and out community, improve the safety of community, promote the usage experience of user.
Description
Technical field
This disclosure relates to field of artificial intelligence, in particular to a kind of community's access control management method, community gate inhibition
Managing device, electronic equipment and computer readable storage medium.
Background technique
With the rapid development of network technology, things in people's life also increasingly with network close association.Community's door
Guarantee of the access control system as a community, safety are increasingly valued by people.
Currently, most of existing access control system is opened the door by way of access card or key, this scheme
In the presence of leaving behind access card or key, the risk that cannot be entered, and go to open the door before needing owner when there is visitor, owner experiences
It is poor;Sometimes can also there are access card or a key loss, and the risk that may be usurped by criminal, safety are poor.
It should be noted that information is only used for reinforcing the reason to the background of the disclosure disclosed in above-mentioned background technology part
Solution, therefore may include the information not constituted to the prior art known to persons of ordinary skill in the art.
Summary of the invention
The disclosure be designed to provide a kind of community's access control management method, community's gate inhibition management apparatus, electronic equipment with
And computer readable storage medium, and then caused by overcoming the limitation and defect due to the relevant technologies to a certain extent, it is existing
Some access cards or key enabling lead to the problem that owner experiences are poor and safety is lower.
According to the disclosure in a first aspect, providing a kind of community's access control management method, comprising:
Occur target object in target area in response to detecting, obtains the corresponding identification information of the target object;
Intellectual analysis processing is carried out to the identification information of the target object, determines the corresponding power of the target object
Limit level data;
The corresponding prevailing state data of the target object are determined according to the Permission Levels data, to pass through the passage
The switch state of status data control community gate inhibition.
In a kind of exemplary embodiment of the disclosure, the identification information includes face characteristic data, the acquisition institute
Stating the corresponding identification information of target object includes:
Obtain the corresponding facial image of the target object;
Feature extraction is carried out to the facial image according to the Feature Selection Model of pre-training, determines the target object pair
The face characteristic data answered are with the corresponding identification information of target object according to the face characteristic data creation.
In a kind of exemplary embodiment of the disclosure, the identification information includes industrial characteristic data, the acquisition institute
Stating the corresponding identification information of target object includes:
Obtain the corresponding dress ornament image of the target object;
Feature identification is carried out to the dress ornament image according to the industry identification model of pre-training, determines the target object pair
The industrial characteristic data answered are with the corresponding identification information of target object according to the industrial characteristic data creation.
In a kind of exemplary embodiment of the disclosure, after obtaining the corresponding identification information of the target object, institute
State method further include:
The corresponding credit score data of the target object are created according to the identification information, and pass through the credit score
The corresponding Permission Levels data of target object described in data point reuse;And
The corresponding credit score data of the target object and the Permission Levels data are uploaded into block chain
It is stored.
In a kind of exemplary embodiment of the disclosure, the target object pair is being determined according to the Permission Levels data
The prevailing state data answered, after through the switch state of prevailing state data control community gate inhibition, the method is also
Include:
Obtain the motion profile and run duration of the target object;
The corresponding current credit score number of the target object is calculated according to the motion profile and the run duration
The credit score data of the target object are updated according to the current credit score data accordingly.
In a kind of exemplary embodiment of the disclosure, according to the motion profile and run duration calculating
The corresponding current credit score data of target object are to update the institute of the target object according to the current credit score data
State credit score data further include:
It obtains and the associated motion profile for following object of the target object and run duration;
The corresponding current credit of the target object is calculated according to the motion profile for following object and run duration
Integration data is to update the credit score data of the target object according to the current credit score data.
In a kind of exemplary embodiment of the disclosure, determine that the target object is corresponding according to the Permission Levels data
Prevailing state data further include:
If the Permission Levels data of the target object are lower than predetermined level, the target object is guided to be visited
Ask request operation;
It obtains the access request and operates corresponding return information, to determine the target object according to the return information
Corresponding prevailing state data;Wherein, the return information includes customized return information.
According to the second aspect of the disclosure, a kind of community's gate inhibition management apparatus is provided, comprising:
Identification information obtains module and obtains the target for occurring target object in target area in response to detecting
The corresponding identification information of object;
Permission Levels data determining module carries out at intellectual analysis for the identification information to the target object
Reason, determines the corresponding Permission Levels data of the target object;
Community's access control module, for determining the corresponding current shape of the target object according to the Permission Levels data
State data, to control the switch state of community gate inhibition by the prevailing state data.
In a kind of exemplary embodiment of the disclosure, the identification information obtains module and includes:
Obtain the corresponding facial image of the target object;
Feature extraction is carried out to the facial image according to the Feature Selection Model of pre-training, determines the target object pair
The face characteristic data answered are with the corresponding identification information of target object according to the face characteristic data creation.
In a kind of exemplary embodiment of the disclosure, the identification information obtains module and includes:
Obtain the corresponding dress ornament image of the target object;
Feature identification is carried out to the dress ornament image according to the industry identification model of pre-training, determines the target object pair
The industrial characteristic data answered are with the corresponding identification information of target object according to the industrial characteristic data creation.
In a kind of exemplary embodiment of the disclosure, community's gate inhibition management apparatus further includes credit score data wound
Unit is built, the credit score data creating unit is configured as:
The corresponding credit score data of the target object are created according to the identification information, and pass through the credit score
The corresponding Permission Levels data of target object described in data point reuse;And
The corresponding credit score data of the target object and the Permission Levels data are uploaded into block chain
It is stored.
In a kind of exemplary embodiment of the disclosure, community's gate inhibition management apparatus further include credit score data more
New unit, the credit score data updating unit are configured as:
Obtain the motion profile and run duration of the target object;
The corresponding current credit score number of the target object is calculated according to the motion profile and the run duration
The credit score data of the target object are updated according to the current credit score data accordingly.
In a kind of exemplary embodiment of the disclosure, the credit score data updating unit is also configured to
It obtains and the associated motion profile for following object of the target object and run duration;
The corresponding current credit of the target object is calculated according to the motion profile for following object and run duration
Integration data is to update the credit score data of the target object according to the current credit score data.
In a kind of exemplary embodiment of the disclosure, community's access control module includes:
If the Permission Levels data of the target object are lower than predetermined level, the target object is guided to be visited
Ask request operation;
It obtains the access request and operates corresponding return information, to determine the target object according to the return information
Corresponding prevailing state data;Wherein, the return information includes customized return information.
According to the third aspect of the disclosure, a kind of electronic equipment is provided, comprising: processor;And memory, for storing
The executable instruction of the processor;Wherein, the processor is configured to above-mentioned to execute via the executable instruction is executed
Method described in any one.
According to the fourth aspect of the disclosure, a kind of computer readable storage medium is provided, computer program is stored thereon with,
The computer program realizes method described in above-mentioned any one when being executed by processor.
Disclosure exemplary embodiment can have it is following partly or entirely the utility model has the advantages that
In community's access control management method provided by an example embodiment of the disclosure, it is corresponding to obtain target object
Identification information;Intellectual analysis processing is carried out to the identification information of target object, determines corresponding Permission Levels data;According to permission
Level data determines the corresponding prevailing state data of target object, to control the switch shape of community gate inhibition by prevailing state data
State.On the one hand, the switch state that community gate inhibition is controlled according to the identification information of target object, can be according to the feature of target object
The accurately switch of access control does not need relevant access card or key, keeps target object disengaging community gate inhibition more square
Just quick, promote usage experience;On the other hand, the Permission Levels number of target object is determined by the identification information of target object
According to, according to Permission Levels data control community gate inhibition switch state, can distinguish the Permission Levels data of different crowd and to
The convenience of different crowd disengaging community gate inhibition is not influenced while improving the safety of community gate inhibition from different permissions,
Further promote the usage experience of user.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not
The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure
Example, and together with specification for explaining the principles of this disclosure.It should be evident that the accompanying drawings in the following description is only the disclosure
Some embodiments for those of ordinary skill in the art without creative efforts, can also basis
These attached drawings obtain other attached drawings.
Fig. 1 is shown can be using a kind of community's access control management method of the embodiment of the present disclosure and the exemplary system of device
The schematic diagram of framework;
Fig. 2 shows the structural schematic diagrams of the computer system of the electronic equipment suitable for being used to realize the embodiment of the present disclosure;
Fig. 3 diagrammatically illustrates the flow diagram of community's access control management method according to one embodiment of the disclosure;
Fig. 4 diagrammatically illustrates the schematic diagram of the data-sharing systems of one embodiment according to the disclosure;
Fig. 5 diagrammatically illustrates the corresponding area of each node in the data-sharing systems according to one embodiment of the disclosure
The schematic diagram of block chain;
Fig. 6 diagrammatically illustrates the signal that block generates in the data-sharing systems according to one embodiment of the disclosure
Figure;
Fig. 7 diagrammatically illustrates the flow diagram updated according to the credit score data of one embodiment of the disclosure;
Fig. 8 diagrammatically illustrates the process signal according to the identification of the extraneous services personnel identity of one embodiment of the disclosure
Figure;
Fig. 9 diagrammatically illustrates the signal of community's access control management method general frame according to one embodiment of the disclosure
Figure;
Figure 10 diagrammatically illustrates the schematic block diagram of community's gate inhibition management apparatus according to one embodiment of the disclosure.
Specific embodiment
Example embodiment is described more fully with reference to the drawings.However, example embodiment can be with a variety of shapes
Formula is implemented, and is not understood as limited to example set forth herein;On the contrary, thesing embodiments are provided so that the disclosure will more
Fully and completely, and by the design of example embodiment comprehensively it is communicated to those skilled in the art.Described feature, knot
Structure or characteristic can be incorporated in any suitable manner in one or more embodiments.In the following description, it provides perhaps
More details fully understand embodiment of the present disclosure to provide.It will be appreciated, however, by one skilled in the art that can
It is omitted with technical solution of the disclosure one or more in the specific detail, or others side can be used
Method, constituent element, device, step etc..In other cases, be not shown in detail or describe known solution to avoid a presumptuous guest usurps the role of the host and
So that all aspects of this disclosure thicken.
In addition, attached drawing is only the schematic illustrations of the disclosure, it is not necessarily drawn to scale.Identical attached drawing mark in figure
Note indicates same or similar part, thus will omit repetition thereof.Some block diagrams shown in the drawings are function
Energy entity, not necessarily must be corresponding with physically or logically independent entity.These function can be realized using software form
Energy entity, or these functional entitys are realized in one or more hardware modules or integrated circuit, or at heterogeneous networks and/or place
These functional entitys are realized in reason device device and/or microcontroller device.
Fig. 1 is shown can be using a kind of community's access control management method of the embodiment of the present disclosure and the exemplary application of device
The schematic diagram of the system architecture of environment.
As shown in Figure 1, system architecture 100 may include one or more of terminal device 101,102,103, network
104 and server 105.Network 104 between terminal device 101,102,103 and server 105 to provide communication link
Medium.Network 104 may include various connection types, such as wired, wireless communication link or fiber optic cables etc..Terminal is set
Standby 101,102,103 can be the various electronic equipments with display screen, including but not limited to desktop computer, portable computing
Machine, smart phone and tablet computer etc..It should be understood that the number of terminal device, network and server in Fig. 1 is only to show
Meaning property.According to needs are realized, any number of terminal device, network and server can have.For example server 105 can be with
It is the server cluster etc. of multiple server compositions.
Community's access control management method provided by the embodiment of the present disclosure is generally executed by server 105, correspondingly, community's door
Prohibit managing device to be generally positioned in server 105.But it will be readily appreciated by those skilled in the art that the embodiment of the present disclosure is mentioned
Community's access control management method of confession can also be executed by terminal device 101,102,103, correspondingly, community's gate inhibition management apparatus
It can be set in terminal device 101,102,103, do not do particular determination in the present exemplary embodiment to this.For example, In
In a kind of exemplary embodiment, it can be user by terminal device 101,102,103 and identification information be uploaded to server
105, communications state data is transferred to terminal by community's access control management method provided by the embodiment of the present disclosure and set by server
Standby 101,102,103 etc..
Fig. 2 shows the structural schematic diagrams of the computer system of the electronic equipment suitable for being used to realize the embodiment of the present disclosure.
It should be noted that Fig. 2 shows the computer system 200 of electronic equipment be only an example, should not be to this public affairs
The function and use scope for opening embodiment bring any restrictions.
As shown in Fig. 2, computer system 200 includes central processing unit (CPU) 201, it can be read-only according to being stored in
Program in memory (ROM) 202 or be loaded into the program in random access storage device (RAM) 203 from storage section 208 and
Execute various movements appropriate and processing.In RAM 203, it is also stored with various programs and data needed for system operatio.CPU
201, ROM 202 and RAM 203 is connected with each other by bus 204.Input/output (I/O) interface 205 is also connected to bus
204。
I/O interface 205 is connected to lower component: the importation 206 including keyboard, mouse etc.;It is penetrated including such as cathode
The output par, c 207 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 208 including hard disk etc.;
And the communications portion 209 of the network interface card including LAN card, modem etc..Communications portion 209 via such as because
The network of spy's net executes communication process.Driver 210 is also connected to I/O interface 205 as needed.Detachable media 211, such as
Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 210, in order to read from thereon
Computer program be mounted into storage section 208 as needed.
Particularly, in accordance with an embodiment of the present disclosure, it may be implemented as computer below with reference to the process of flow chart description
Software program.For example, embodiment of the disclosure includes a kind of computer program product comprising be carried on computer-readable medium
On computer program, which includes the program code for method shown in execution flow chart.In such reality
It applies in example, which can be downloaded and installed from network by communications portion 209, and/or from detachable media
211 are mounted.When the computer program is executed by central processing unit (CPU) 201, execute in the present processes and device
The various functions of limiting.In some embodiments, computer system 200 can also include AI (Artificial
Intelligence, artificial intelligence) processor, the AI processor is for handling the calculating operation in relation to machine learning.
It should be noted that computer-readable medium shown in the disclosure can be computer-readable signal media or meter
Calculation machine readable storage medium storing program for executing either the two any combination.Computer readable storage medium for example can be --- but not
Be limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or any above combination.Meter
The more specific example of calculation machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, just of one or more conducting wires
Taking formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type may be programmed read-only storage
Device (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device,
Or above-mentioned any appropriate combination.In the disclosure, computer readable storage medium can be it is any include or storage journey
The tangible medium of sequence, the program can be commanded execution system, device or device use or in connection.And at this
In open, computer-readable signal media may include in a base band or as the data-signal that carrier wave a part is propagated,
Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including but unlimited
In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can
Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for
By the use of instruction execution system, device or device or program in connection.Include on computer-readable medium
Program code can transmit with any suitable medium, including but not limited to: wireless, electric wire, optical cable, RF etc. are above-mentioned
Any appropriate combination.
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
A part of one module, program segment or code of table, a part of above-mentioned module, program segment or code include one or more
Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box
The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical
On can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it wants
It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule
The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction
It closes to realize.
Being described in unit involved in the embodiment of the present disclosure can be realized by way of software, can also be by hard
The mode of part realizes that described unit also can be set in the processor.Wherein, the title of these units is in certain situation
Under do not constitute restriction to the unit itself.
As on the other hand, present invention also provides a kind of computer-readable medium, which be can be
Included in electronic equipment described in above-described embodiment;It is also possible to individualism, and without in the supplying electronic equipment.
Above-mentioned computer-readable medium carries one or more program, when the electronics is set by one for said one or multiple programs
When standby execution, so that method described in electronic equipment realization as the following examples.For example, the electronic equipment can be real
Now such as Fig. 3, Fig. 7, each step shown in Fig. 8.
The technical solution of the embodiment of the present disclosure is described in detail below:
In current community's entrance guard management scheme, most of is by access card or key opens the door or recognition of face brush
Face is entered.But need to carry key or access card in through the access card scheme that perhaps key opens the door, exist
Access card is left behind, the experience of the risk that cannot be entered, owner is poor;Secondly traditional key or access card open the door, with
It is highly inconvenient that body carries these articles;And respondent owner is needed downstairs to open the door when having visitor;Access card is easy to lose
It loses or utilization is stolen by illegal person, the safety of community is severely impacted.In the side to be entered by recognition of face brush face
In case, user is needed to shift to an earlier date registered face information, not registered then unavailable;The accuracy of recognition of face is poor;External visitor
Unfriendly, visitor does not have face information that cannot enter;It is unfriendly to external attendant, for example take-away person not can enter cell,
Reduce efficiency.
Based on said one or multiple problems, this example embodiment provides a kind of community's access control management method.The society
Area's access control management method can be applied to above-mentioned server 105, also can be applied in above-mentioned terminal device 101,102,103
One or more does not do particular determination to this in the present exemplary embodiment.In server 105 (cloud) in this example embodiment
It is illustrated for execution this method, refering to what is shown in Fig. 3, community's access control management method may comprise steps of S310 to step
Rapid S330:
Step S310, occur target object in target area in response to detecting, obtain the corresponding mark of the target object
Know information;
Step S320, intellectual analysis processing is carried out to the identification information of the target object, determines the target pair
As corresponding Permission Levels data;
Step S330, the corresponding prevailing state data of the target object are determined according to the Permission Levels data, with logical
Cross the switch state of the prevailing state data control community gate inhibition.
In community's access control management method provided by this example embodiment, on the one hand, according to the mark of target object
Information controls the switch state of community gate inhibition, can not be needed according to the switch of the feature of target object accurately access control
Relevant access card or key keep target object disengaging community gate inhibition more convenient, promote usage experience;Another party
Face determines the Permission Levels data of target object by the identification information of target object, controls community according to Permission Levels data
The switch state of gate inhibition can distinguish the Permission Levels data of different crowd and give different permissions, improve community gate inhibition
Safety while, do not influence different crowd disengaging community gate inhibition convenience, further promoted user usage experience.
In the following, the above-mentioned steps for this example embodiment are described in more details.
In step s310, occur target object in target area in response to detecting, it is corresponding to obtain the target object
Identification information.
In one example embodiment of the disclosure, target area can refer to that developer or administrative staff preset
, detection range for carrying out target object identification, such as target area can be community gate inhibition three meters of circle nearby
Shape region is also possible to the fan-shaped region of first three meter of community gate inhibition, and certainly, target area can also be other ranges and shape
Region, concrete condition developer or administrative staff can carry out customized setting according to ambient enviroment, this example is implemented
Example is not particularly limited this.By the parameter different for setting of the varying environment to target area, target can improved
While the accuracy of object identity identification, the energy consumption of detection system is saved.
Target object can refer to that community gate inhibition nearby has intention the object by gate inhibition, such as target object can be society
Owner in area, is also possible to visitor, can also be extraneous services personnel, this example embodiment does not do particular determination to this.Tool
Body can be by being intended to analysis model with motion profile of the target object in target area and towards judging target object
Whether intentional community gate inhibition is passed through.Identification information can be the information for referring to characterization target object identity information, such as mark
Knowing information can be the face characteristic data of target object, be also possible to the resemblances such as the height and weight of target object, certainly,
Identification information can also be the garment ornament of wearing of target object, this example embodiment does not do particular determination to this.
Specifically, obtaining the corresponding facial image of target object;According to the Feature Selection Model of pre-training to facial image
Feature extraction is carried out, determines the corresponding face characteristic data of target object with corresponding according to face characteristic data creation target object
Identification information.Facial image can refer to by with Intelligent human-face detect camera acquisition into the mesh in target zone
Mark the face image of object.Feature Selection Model can refer to that trains in advance can extract the corresponding characteristic information of facial image
Model, such as Feature Selection Model can be the convolutional neural networks model with feature extraction functions, certainly, feature extraction
Model can also be other learning models with feature extraction functions, this example embodiment is not limited.Face characteristic number
According to the corresponding characteristic of facial image that can refer to the target object extracted by Feature Selection Model, by face characteristic number
According to the identification information as target object.
Specifically, obtaining the corresponding dress ornament image of the target object;According to the industry identification model of pre-training to described
Dress ornament image carries out feature identification, determines the corresponding industrial characteristic data of the target object according to the industrial characteristic data
Create the corresponding identification information of the target object.Dress ornament image can refer to by having intelligent dress ornament to detect camera acquisition
The image for wearing dress ornament into the target object in target zone, industry identification model can refer in advance training can
The model of the corresponding garment ornament information of dress ornament image is extracted, to judge the corresponding industry of dress ornament image according to garment ornament information
Information, such as industry identification model can be the convolutional neural networks model with garment ornament extraction and classification feature, when
So, industry identification model can also be that other are extracted with garment ornament and the learning model of classification feature, this example are implemented
Example is not limited.Such as include the identification pattern of certain industry in garment ornament information, it is determined that target object is the sector
Attendant.Industrial characteristic data can refer to the target by industry identification model by the dress ornament image recognition of target object
The corresponding industry of object, using industrial characteristic data as the identification information of target object.
In step s 320, intellectual analysis processing is carried out to the identification information of the target object, determines the mesh
Mark the corresponding Permission Levels data of object.
In one example embodiment of the disclosure, intellectual analysis processing can refer to the identification information according to target object
(such as face characteristic data, industrial characteristic data, body type data etc.), the processing that the identity information of target object is determined
Process.Permission Levels data, which can refer to, carries out the target object obtained after intellectual analysis processing to the identification information of target object
The corresponding permission of identity, such as Permission Levels data can be owner's permission, be also possible to visitor's permission, certainly, permission etc.
Grade data can also be extraneous services personnel's permission, only schematically illustrate herein, this example embodiment does not do special limit to this
It is fixed.
Further, the corresponding credit score data of target object are created according to identification information, and passes through credit score number
According to the corresponding Permission Levels data of adjustment target object;And by the corresponding credit score data of target object and Permission Levels
Data upload to block chain and are stored.Credit score data can refer to characterization target object to the degree of danger of Community Safety
Data, for example, when the target object that permission level data is visitor's permission repeatedly enters in community, and do not make and any having
The event for damaging Community Safety, can promote the credit score data of target object;Opposite, if the Permission Levels of target object
Data are visitor's permission, but abnormal behavior of the target object in community, and are handled by intellectual analysis and determine target object
When having certain influence to Community Safety, the credit score data of target object are reduced.
It can refer to the letter in target object by the corresponding Permission Levels data of credit score data point reuse target object
According to the corresponding Permission Levels data of credit score data point reuse target object, example when being more than preset threshold with integration data variation
It, will such as when the amplitude that the credit score data for the target object that permission level data is visitor's permission are promoted is more than preset threshold
Visitor's permission (need to request and can just open community gate inhibition after the owner of owner's permission agrees to) of target object upgrades to
Resident visitor (not needing to make requests);Opposite, when the credit score for the target object that permission level data is visitor's permission
When the amplitude of data decline is more than preset threshold, visitor's permission of target object (is needed to request and in the owner of owner's permission
Community gate inhibition can be just opened after agreement) under be adjusted to dangerous visitor (need to make requests and need administrative staff agree to after
Community gate inhibition can be opened).
The corresponding credit score data of target object and Permission Levels data are finally uploaded to block chain to store,
It can guarantee that credit score data and Permission Levels data can not distort, guarantee the safety of data.
Specifically, data-sharing systems shown in Figure 4, data-sharing systems 400 refer to for carrying out node and section
The system of data sharing between point, may include multiple nodes 401 in the data-sharing systems, multiple nodes 401 can refer to
Each client in data-sharing systems.Each node 401 can receive input information work normally, and based on connecing
The shared data in input maintenance of information data-sharing systems received.In order to guarantee that the information in data-sharing systems is mutual
Logical, there may be information to connect between each node in data-sharing systems, can be connected by above- mentioned information between node
Carry out information transmission.For example, when the arbitrary node in data-sharing systems receives different vertical domain knowledge maps, number
The vertical domain knowledge map is just obtained according to common recognition algorithm according to other nodes in shared system, by the vertical domain knowledge figure
Spectrum is stored as the data in shared data, so that the data stored on whole nodes in data-sharing systems are consistent.
For each node in data-sharing systems, corresponding node identification, and data sharing system are all had
Each node in system can store the node identification of other nodes in data-sharing systems, so as to subsequent according to other sections
The block of generation, is broadcasted other nodes into data-sharing systems by the node identification of point.One can be safeguarded in each node
Node identification list as shown in the table stores nodename and node identification correspondence into the node identification list.Wherein,
Node identification can for (Internet Protocol, the agreement interconnected between the network) address IP and other any can use
It is only illustrated by taking IP address as an example in the information for identifying the node, table 1.
1 node identification of table
Nodename | Node identification |
Node 1 | 117.114.151.174 |
Node 2 | 117.116.189.145 |
… | … |
Node N | 119.123.789.258 |
Each node in data-sharing systems stores an identical block chain.Block chain is made of multiple blocks,
Shown in Figure 5, block chain is made of multiple blocks, and originating includes block head and block main body in block, is stored in block head
Information characteristics value, version number, timestamp and difficulty value are inputted, is stored with input information in block main body;Next area of original block
Block, for father's block, is equally included block head and block main body in next block, is stored with current block in block head with original block
Input information characteristics value, father's block block head characteristic value, version number, timestamp and difficulty value, and so on so that area
The block data stored in each block in block chain, which exists with the block data stored in father's block, to be associated with, and ensure that in block
Input the safety of information.
Shown in Figure 6 when generating each block in block chain, the node where block chain is receiving input letter
When breath, input information is verified, after completing verification, input information is stored into memory pool, and update it and be used to record
Input the Hash tree of information;Later, renewal time stamp is updated to receive the time of input information, and attempted different random
Number repeatedly carries out characteristic value calculating, so that the characteristic value being calculated can satisfy following formula (1):
Wherein, SHA256 is to calculate feature value-based algorithm used in characteristic value;Version (version number) is related in block chain
The version information of block agreement;Prev_hash is the block head characteristic value of father's block of current block;Merkle_root is defeated
Enter the characteristic value of information;Ntime is the renewal time of renewal time stamp;Nbits is current difficulty, is whithin a period of time fixed
Value, and be determined again after beyond fixed time period;X is random number;TARGET is characterized value threshold value, this feature value threshold value
It can be obtained according to nbits determination.
In this way, the corresponding storage of information can be generated block when the random number for meeting above-mentioned formula (1) is calculated
Head and block main body, obtain current block.Then, node where block chain is according to the nodes of other nodes in data-sharing systems
Mark, other nodes newly-generated block being sent respectively in the data-sharing systems where it, by other nodes to new
The block of generation is verified, and is added to newly-generated block in the block chain of its storage after completing verification.
Further, the motion profile and run duration of target object are obtained;According to motion profile and run duration
The corresponding current credit score data of target object are calculated to update the credit product of target object according to current credit score data
Divided data.Motion profile can be the motion path for referring to target object after entering community in community scope, according to the fortune
The dangerous tendency of dynamic trajectory analysis target object, for example, if motion profile of the target object in community shows it always in building
It hovers, and the motion profile at parked vehicle is more intensive, is then carried out by the motion profile to the target object outside
Intellectual analysis processing determines that the motion profile has dangerous tendency, reduces its credit score data.Run duration can refer to
The corresponding run duration of the motion profile of target object, similarly, according to the dangerous tendency of the motion trail analysis target object,
For example, if run duration of the target object in community outside building is far longer than the run duration in building, and rest on the vehicles
The run duration of park is longer, then carries out intellectual analysis processing by the motion profile to the target object and determine the movement rail
Mark has dangerous tendency, reduces its credit score data.Current credit score data can refer to the history according to target object
The credit score data for the target object that credit score data and current motion profile, run duration recalculate.
In step S330, the corresponding prevailing state data of the target object are determined according to the Permission Levels data,
To control the switch state of community gate inhibition by the prevailing state data.
In one example embodiment of the disclosure, prevailing state data can be the Permission Levels data pair for referring to target object
The prevailing state answered, for example, if the Permission Levels data of target object are that proprietary equity is prescribed a time limit, corresponding prevailing state data can
To be to let pass at once;If the Permission Levels data of target object are visitor's permissions, corresponding prevailing state data be can be
It lets pass after interviewed owner agrees to;It is corresponding logical if the Permission Levels data of target object are extraneous services personnel's permissions
Row status data, which can be, to be notified administrative staff and lets pass.The switch state of community gate inhibition refers to that community gate inhibition's beats on or off
It closes, the clearance or entrance of corresponding prevailing state data.
Optionally, it obtains and the associated motion profile for following object of target object and run duration;According to following pair
The motion profile and run duration of elephant calculate the corresponding current credit score data of target object according to current credit score
The credit score data of data update target object.It follows object that can refer to and follows Permission Levels data or credit product
The higher target object of divided data enters the Permission Levels data or the lower object of credit score data of community, at this time can be with
Think that target object is the guarantor for following object.It therefore can be according to according to the motion profile and run duration for following object
The corresponding current credit score data of target object are calculated to update the letter of target object according to current credit score data
Use integration data.By the Permission Levels data of target object or credit score data are associated with it that object is followed to tie up
It is fixed, further ensure the safety of community.
Optionally, if the Permission Levels data of target object are lower than predetermined level, guiding target object, which accesses, is asked
Ask operation;It obtains access request and operates corresponding return information, to determine the corresponding current shape of target object according to return information
State data;Wherein, return information includes customized return information.Predetermined level can refer to pre-set binding authority grade
The data that the lower target object of data enters, for example, predetermined level can be owner's Permission Levels in this example embodiment,
Lower than owner's Permission Levels visitor's permission needs access request operation.Access request operation can refer to Permission Levels number
It needs to make requests to the owner of access into community according to the target object lower than predetermined level.Return information can refer to response
It can be owner in the data that access request operation returns, such as return information and see the data replied after access request, certainly,
Return information can also be that the data of other forms, this example embodiment are not limited.It may include customized for replying data
Return information, customized return information can refer to the information for the response access request that owner is arranged in advance, such as owner can be with
Setting do not disturb the period, or setting owner stay out please make another appointment ask information for instructions.For extraneous services personnel, cloud service
The rule that can be defined according to owner calculates the best window of opportunity for allowing attendant to enter, and is only signal herein certainly
Property explanation, any particular determination should not be caused to this example embodiment.
Fig. 7 diagrammatically illustrates the flow diagram updated according to the credit score data of one embodiment of the disclosure.
Refering to what is shown in Fig. 7, step S710 captures target object in community after target object enters community by gate inhibition
Action trail;Step S720 records the motion profile and the corresponding run duration of motion profile of target object;Step
S730 determines the identity information of target object according to the motion profile of target object and run duration, and according to motion profile
And the corresponding run duration of motion profile determines the dangerous tendency data of target object to calculate according to the dangerous tendency data
The current credit score data of target object;It is corresponding to update target object according to the identity information of target object by step S740
Personal information library and update corresponding credit score data according to the current credit score data of target object.
Fig. 8 diagrammatically illustrates the process signal according to the identification of the extraneous services personnel identity of one embodiment of the disclosure
Figure.
Refering to what is shown in Fig. 8, step S810, captures the dress ornament information and figure information of target object, and extract dress ornament spy
Reference breath and behavior characteristic information;Step S820 judges mesh according to the garment ornament information and behavior characteristic information of extraction
Whether mark object dresses industry work clothes, no to then follow the steps if not dressing industry work clothes thens follow the steps S830
S840;Step S830 continues to judge whether target object is owner if not dressing industry work clothes, if it is execute
Step S850, it is no to then follow the steps S860;Step S840 continues to judge target if target object dresses industry work clothes
Whether the behavioural characteristic of object is consistent with industrial characteristic, no to then follow the steps S860 if it is thening follow the steps S850;Step
S850 updates personal information library and the credit score data of target object;Step S860 closes gate inhibition, forbids target object
Into community;Step S870 opens gate inhibition, and target object is allowed to enter community.
Fig. 9 diagrammatically illustrates the signal of community's access control management method general frame according to one embodiment of the disclosure
Figure.
Refering to what is shown in Fig. 9, step S910, by the AI algorithm in cloud to target object carry out trajectory track, recognition of face,
Behavioral value, garments worn analysis etc.;Step S920 carries out trajectory track, people to target object according to cloud in step S910
It is that face identification, behavioral value, garments worn are analyzed (such as to differentiate target as a result, differentiated to the identity of target object
The identity of object is visitor, owner, extraneous services personnel);Step S930 carries out the target object of different identity by cloud
Processing: 1, visitor is handled: visitor, which gets started, to be applied;2, owner establishes portrait (owner's mark);3, extraneous services personnel establish credit
Integrating system;4, personnel's perceived distance opens community gate inhibition for there is the target object of enabling permission in advance;Step S940, when
It when the judging identity of target object is visitor, needs visitor to send to interviewed owner and requests, beaten after owner confirms visitor's identity
It opens the door and prohibits;Step S950, when the judging identity of target object is owner, directly opening gate inhibition lets pass;Step S960, works as target
When the judging identity of object is extraneous services personnel, the corresponding credit score data of extraneous services personnel are determined;Step S970, root
Judge whether to open the door according to the corresponding credit score data of extraneous services personnel.
It should be noted that although describing each step of method in the disclosure in the accompanying drawings with particular order, this is simultaneously
Undesired or hint must execute these steps in this particular order, or have to carry out the ability of step shown in whole
Realize desired result.Additional or alternative, it is convenient to omit multiple steps are merged into a step and executed by certain steps,
And/or a step is decomposed into execution of multiple steps etc..
Further, in this example embodiment, a kind of community's gate inhibition management apparatus is additionally provided.Community's entrance guard management
Device can be applied to a server or terminal device.Refering to what is shown in Fig. 10, community's gate inhibition management apparatus 1000 may include
Identification information obtains module 1010, Permission Levels data determining module 1020 and community's access control module 1030.Wherein:
Identification information obtains module 1010, in response to detecting occur target object in target area, described in acquisition
The corresponding identification information of target object;
Permission Levels data determining module 1020 carries out intellectual analysis for the identification information to the target object
Processing, determines the corresponding Permission Levels data of the target object;
Community's access control module 1030, for determining that the target object is corresponding logical according to the Permission Levels data
Row status data, to control the switch state of community gate inhibition by the prevailing state data.
In a kind of exemplary embodiment of the disclosure, the identification information obtains module 1010 and includes:
Obtain the corresponding facial image of the target object;
Feature extraction is carried out to the facial image according to the Feature Selection Model of pre-training, determines the target object pair
The face characteristic data answered are with the corresponding identification information of target object according to the face characteristic data creation.
In a kind of exemplary embodiment of the disclosure, the identification information obtains module 1010 and includes:
Obtain the corresponding dress ornament image of the target object;
Feature identification is carried out to the dress ornament image according to the industry identification model of pre-training, determines the target object pair
The industrial characteristic data answered are with the corresponding identification information of target object according to the industrial characteristic data creation.
In a kind of exemplary embodiment of the disclosure, community's gate inhibition management apparatus 1000 further includes credit score number
According to creating unit, the credit score data creating unit is configured as:
The corresponding credit score data of the target object are created according to the identification information, and pass through the credit score
The corresponding Permission Levels data of target object described in data point reuse;And
The corresponding credit score data of the target object and the Permission Levels data are uploaded into block chain
It is stored.
In a kind of exemplary embodiment of the disclosure, community's gate inhibition management apparatus 1000 further includes credit score number
According to updating unit, the credit score data updating unit is configured as:
Obtain the motion profile and run duration of the target object;
The corresponding current credit score number of the target object is calculated according to the motion profile and the run duration
The credit score data of the target object are updated according to the current credit score data accordingly.
In a kind of exemplary embodiment of the disclosure, the credit score data updating unit is also configured to
It obtains and the associated motion profile for following object of the target object and run duration;
The corresponding current credit of the target object is calculated according to the motion profile for following object and run duration
Integration data is to update the credit score data of the target object according to the current credit score data.
In a kind of exemplary embodiment of the disclosure, community's access control module 1030 includes:
If the Permission Levels data of the target object are lower than predetermined level, the target object is guided to be visited
Ask request operation;
It obtains the access request and operates corresponding return information, to determine the target object according to the return information
Corresponding prevailing state data;Wherein, the return information includes customized return information.
Each module or the detail of unit are in corresponding community's entrance guard management in above-mentioned community's gate inhibition management apparatus
It is described in detail in method, therefore details are not described herein again.
It should be noted that although being referred to several modules or list for acting the equipment executed in the above detailed description
Member, but this division is not enforceable.In fact, according to embodiment of the present disclosure, it is above-described two or more
Module or the feature and function of unit can embody in a module or unit.Conversely, an above-described mould
The feature and function of block or unit can be to be embodied by multiple modules or unit with further division.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the disclosure
Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or
Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure
Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following
Claim is pointed out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and
And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.
Claims (10)
1. a kind of community's access control management method characterized by comprising
Occur target object in target area in response to detecting, obtains the corresponding identification information of the target object;
Intellectual analysis processing is carried out to the identification information of the target object, determines corresponding permission of the target object etc.
Grade data;
The corresponding prevailing state data of the target object are determined according to the Permission Levels data, to pass through the prevailing state
The switch state of data control community gate inhibition.
2. community's access control management method according to claim 1, which is characterized in that the identification information includes face characteristic
Data, the corresponding identification information of the target object that obtains include:
Obtain the corresponding facial image of the target object;
Feature extraction is carried out to the facial image according to the Feature Selection Model of pre-training, determines that the target object is corresponding
Face characteristic data are with the corresponding identification information of target object according to the face characteristic data creation.
3. community's access control management method according to claim 1, which is characterized in that the identification information includes industrial characteristic
Data, the corresponding identification information of the target object that obtains include:
Obtain the corresponding dress ornament image of the target object;
Feature identification is carried out to the dress ornament image according to the industry identification model of pre-training, determines that the target object is corresponding
Industrial characteristic data are with the corresponding identification information of target object according to the industrial characteristic data creation.
4. community's access control management method according to claim 1, which is characterized in that obtaining, the target object is corresponding
After identification information, the method also includes:
The corresponding credit score data of the target object are created according to the identification information, and pass through the credit score data
Adjust the corresponding Permission Levels data of the target object;And
The corresponding credit score data of the target object and the Permission Levels data are uploaded to block chain to carry out
Storage.
5. community's access control management method according to claim 4, which is characterized in that true according to the Permission Levels data
The corresponding prevailing state data of the target object are determined, to pass through the switch state that the prevailing state data control community gate inhibition
Later, the method also includes:
Obtain the motion profile and run duration of the target object;
According to the motion profile and the run duration calculate the corresponding current credit score data of the target object with
The credit score data of the target object are updated according to the current credit score data.
6. community's access control management method according to claim 5, which is characterized in that according to the motion profile and described
Run duration calculates the corresponding current credit score data of the target object to update according to the current credit score data
The credit score data of the target object further include:
It obtains and the associated motion profile for following object of the target object and run duration;
The corresponding current credit score of the target object is calculated according to the motion profile for following object and run duration
Data are to update the credit score data of the target object according to the current credit score data.
7. community's access control management method according to claim 1, which is characterized in that determined according to the Permission Levels data
The corresponding prevailing state data of the target object further include:
If the Permission Levels data of the target object are lower than predetermined level, guide the target object to access and ask
Ask operation;
It obtains the access request and operates corresponding return information, to determine that the target object is corresponding according to the return information
Prevailing state data;Wherein, the return information includes customized return information.
8. a kind of community's gate inhibition management apparatus characterized by comprising
Identification information obtains module and obtains the target object for occurring target object in target area in response to detecting
Corresponding identification information;
Permission Levels data determining module carries out intellectual analysis processing for the identification information to the target object, really
Determine the corresponding Permission Levels data of the target object;
Community's access control module, for determining the corresponding prevailing state number of the target object according to the Permission Levels data
According to control the switch state of community gate inhibition by the prevailing state data.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt
Claim 1-7 described in any item methods are realized when processor executes.
10. a kind of electronic equipment characterized by comprising
Processor;And
Memory, for storing the executable instruction of the processor;
Wherein, the processor is configured to require 1-7 described in any item via executing the executable instruction and carry out perform claim
Method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910849663.3A CN110473328B (en) | 2019-09-09 | 2019-09-09 | Community access control management method and device, storage medium and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910849663.3A CN110473328B (en) | 2019-09-09 | 2019-09-09 | Community access control management method and device, storage medium and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110473328A true CN110473328A (en) | 2019-11-19 |
CN110473328B CN110473328B (en) | 2021-11-05 |
Family
ID=68515207
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910849663.3A Active CN110473328B (en) | 2019-09-09 | 2019-09-09 | Community access control management method and device, storage medium and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110473328B (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111402471A (en) * | 2020-03-05 | 2020-07-10 | 慧科(台州)智能系统有限公司 | Personnel processing mode determining method and device and data processing platform |
CN111429627A (en) * | 2020-03-26 | 2020-07-17 | 广东中凯智慧政务软件有限公司 | Method for checking in and out registration, intelligent terminal, storage medium and monitoring system |
CN112037410A (en) * | 2020-11-06 | 2020-12-04 | 上海兴容信息技术有限公司 | Control method and system of intelligent access control |
CN112085878A (en) * | 2020-09-07 | 2020-12-15 | 广州东软科技有限公司 | House supervisory systems based on waste classification |
CN112183140A (en) * | 2020-09-30 | 2021-01-05 | 上海创功通讯技术有限公司 | Parameter calling method, mobile terminal and system |
CN112365643A (en) * | 2020-11-16 | 2021-02-12 | 深圳市天彦通信股份有限公司 | Access area authority management method and related device |
CN112465552A (en) * | 2020-11-30 | 2021-03-09 | 北京云创生活科技有限公司 | Community point counting method, device and equipment and readable storage medium |
CN113468948A (en) * | 2021-04-26 | 2021-10-01 | 深圳市安软科技股份有限公司 | View data based security and protection control method, module, equipment and storage medium |
CN114553474A (en) * | 2022-01-07 | 2022-05-27 | 南方电网深圳数字电网研究院有限公司 | Access control permission control method and device based on Internet of things |
CN115083053A (en) * | 2022-06-15 | 2022-09-20 | 深圳市银河通信科技有限公司 | Intelligent community access control system and control method |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1717696A (en) * | 2002-11-29 | 2006-01-04 | Vcs国际有限公司 | System for processing visual information and method of visual surveillance |
EP2555169A2 (en) * | 2011-08-02 | 2013-02-06 | ASSA ABLOY Sicherheitstechnik GmbH | Terminal de voie de secours avec interface de lecture |
CN106373240A (en) * | 2016-09-14 | 2017-02-01 | 浙江维融电子科技股份有限公司 | Intelligent monitoring system of self-service bank and monitoring method thereof |
KR101783377B1 (en) * | 2016-12-07 | 2017-10-12 | 주식회사 포커스에이치엔에스 | A security management method using a face recognition algorithm |
CN107331003A (en) * | 2017-06-22 | 2017-11-07 | 厦门劢联科技有限公司 | A kind of school dormitory's management system based on recognition of face |
CN108230497A (en) * | 2017-12-21 | 2018-06-29 | 合肥天之通电子商务有限公司 | A kind of gate inhibition's safety protection method based on express delivery feature recognition |
CN108235321A (en) * | 2018-01-03 | 2018-06-29 | 深圳正品创想科技有限公司 | A kind of intelligence WIFI cut-in methods, device and unmanned shop |
US20190087464A1 (en) * | 2017-09-21 | 2019-03-21 | Hongfujin Precision Electronics (Tianjin) Co.,Ltd. | Regional population management system and method |
CN109920178A (en) * | 2019-04-08 | 2019-06-21 | 深圳市远景达物联网技术有限公司 | A kind of unmanned supermarket system |
CN109934977A (en) * | 2019-02-12 | 2019-06-25 | 山西省河道与水库技术中心 | A kind of intelligent entrance guard recognition methods suitable for unit of opening to the outside world |
CN110009543A (en) * | 2019-04-02 | 2019-07-12 | 深圳市万物云科技有限公司 | Based on artificial intelligence community access control management method and device and system and storage medium |
-
2019
- 2019-09-09 CN CN201910849663.3A patent/CN110473328B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1717696A (en) * | 2002-11-29 | 2006-01-04 | Vcs国际有限公司 | System for processing visual information and method of visual surveillance |
EP2555169A2 (en) * | 2011-08-02 | 2013-02-06 | ASSA ABLOY Sicherheitstechnik GmbH | Terminal de voie de secours avec interface de lecture |
CN106373240A (en) * | 2016-09-14 | 2017-02-01 | 浙江维融电子科技股份有限公司 | Intelligent monitoring system of self-service bank and monitoring method thereof |
KR101783377B1 (en) * | 2016-12-07 | 2017-10-12 | 주식회사 포커스에이치엔에스 | A security management method using a face recognition algorithm |
CN107331003A (en) * | 2017-06-22 | 2017-11-07 | 厦门劢联科技有限公司 | A kind of school dormitory's management system based on recognition of face |
US20190087464A1 (en) * | 2017-09-21 | 2019-03-21 | Hongfujin Precision Electronics (Tianjin) Co.,Ltd. | Regional population management system and method |
CN108230497A (en) * | 2017-12-21 | 2018-06-29 | 合肥天之通电子商务有限公司 | A kind of gate inhibition's safety protection method based on express delivery feature recognition |
CN108235321A (en) * | 2018-01-03 | 2018-06-29 | 深圳正品创想科技有限公司 | A kind of intelligence WIFI cut-in methods, device and unmanned shop |
CN109934977A (en) * | 2019-02-12 | 2019-06-25 | 山西省河道与水库技术中心 | A kind of intelligent entrance guard recognition methods suitable for unit of opening to the outside world |
CN110009543A (en) * | 2019-04-02 | 2019-07-12 | 深圳市万物云科技有限公司 | Based on artificial intelligence community access control management method and device and system and storage medium |
CN109920178A (en) * | 2019-04-08 | 2019-06-21 | 深圳市远景达物联网技术有限公司 | A kind of unmanned supermarket system |
Non-Patent Citations (2)
Title |
---|
李绍军: "《物流信息技术》", 30 June 2018 * |
王永升: "出入口控制在智慧社区建设中的应用", 《中国安防》 * |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111402471A (en) * | 2020-03-05 | 2020-07-10 | 慧科(台州)智能系统有限公司 | Personnel processing mode determining method and device and data processing platform |
CN111429627A (en) * | 2020-03-26 | 2020-07-17 | 广东中凯智慧政务软件有限公司 | Method for checking in and out registration, intelligent terminal, storage medium and monitoring system |
CN112085878A (en) * | 2020-09-07 | 2020-12-15 | 广州东软科技有限公司 | House supervisory systems based on waste classification |
CN112183140B (en) * | 2020-09-30 | 2024-05-14 | 上海创功通讯技术有限公司 | Parameter calling method, mobile terminal and system |
CN112183140A (en) * | 2020-09-30 | 2021-01-05 | 上海创功通讯技术有限公司 | Parameter calling method, mobile terminal and system |
CN112037410A (en) * | 2020-11-06 | 2020-12-04 | 上海兴容信息技术有限公司 | Control method and system of intelligent access control |
CN112365643A (en) * | 2020-11-16 | 2021-02-12 | 深圳市天彦通信股份有限公司 | Access area authority management method and related device |
CN112465552A (en) * | 2020-11-30 | 2021-03-09 | 北京云创生活科技有限公司 | Community point counting method, device and equipment and readable storage medium |
CN113468948B (en) * | 2021-04-26 | 2023-11-10 | 深圳市安软科技股份有限公司 | View data-based security control method, module, equipment and storage medium |
CN113468948A (en) * | 2021-04-26 | 2021-10-01 | 深圳市安软科技股份有限公司 | View data based security and protection control method, module, equipment and storage medium |
CN114553474A (en) * | 2022-01-07 | 2022-05-27 | 南方电网深圳数字电网研究院有限公司 | Access control permission control method and device based on Internet of things |
CN114553474B (en) * | 2022-01-07 | 2023-11-03 | 南方电网数字平台科技(广东)有限公司 | Access control permission control method and device based on Internet of things |
CN115083053A (en) * | 2022-06-15 | 2022-09-20 | 深圳市银河通信科技有限公司 | Intelligent community access control system and control method |
CN115083053B (en) * | 2022-06-15 | 2023-11-21 | 深圳市银河通信科技有限公司 | Intelligent community access control system and control method |
Also Published As
Publication number | Publication date |
---|---|
CN110473328B (en) | 2021-11-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110473328A (en) | Community's access control management method and device, storage medium, electronic equipment | |
WO2019137050A1 (en) | Real-time fraud detection method and device under internet credit scene, and server | |
CN104240342B (en) | Access control method and device based on identity authentication | |
US10275671B1 (en) | Validating identity and/or location from video and/or audio | |
CN109145781A (en) | Method and apparatus for handling image | |
CN110458154A (en) | Face identification method, device and computer readable storage medium | |
CN104240013B (en) | A kind of access control method and access control platform | |
CN110197315A (en) | Methods of risk assessment, device and its storage medium | |
CN109063920A (en) | A kind of transaction risk recognition methods, device and computer equipment | |
US20060222244A1 (en) | Grouping items in video stream images into events | |
CN108415653A (en) | Screen locking method and device for terminal device | |
CN101657807A (en) | Be used for dynamically control to the method and system of the visit of network | |
CN108269331A (en) | A kind of intelligent video big data processing system | |
CN108596616A (en) | User data authenticity analysis method and device, storage medium, electronic equipment | |
KR102244180B1 (en) | Face recognition access control system and method based on automatic face registration and renewal | |
CN109377104A (en) | Data processing method, device, medium and electronic equipment | |
CN109948320A (en) | Identity identification managing method, device, medium and electronic equipment based on block chain | |
CN111312406B (en) | Epidemic situation label data processing method and system | |
CN108257178A (en) | For positioning the method and apparatus of the position of target body | |
CN108491823A (en) | Method and apparatus for generating eye recognition model | |
CN105637522A (en) | World-driven access control using trusted certificates | |
CN109934191A (en) | Information processing method and device | |
WO2020202694A1 (en) | Surveillance system, surveillance device, surveillance method, and non-temporary computer readable medium | |
CN111199602A (en) | Access control method based on personnel big data acquisition and analysis | |
CN108154111A (en) | Biopsy method, system, electronic equipment and computer-readable medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |