CN110473328A - Community's access control management method and device, storage medium, electronic equipment - Google Patents

Community's access control management method and device, storage medium, electronic equipment Download PDF

Info

Publication number
CN110473328A
CN110473328A CN201910849663.3A CN201910849663A CN110473328A CN 110473328 A CN110473328 A CN 110473328A CN 201910849663 A CN201910849663 A CN 201910849663A CN 110473328 A CN110473328 A CN 110473328A
Authority
CN
China
Prior art keywords
target object
data
community
identification information
credit score
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910849663.3A
Other languages
Chinese (zh)
Other versions
CN110473328B (en
Inventor
潘崇
欧阳国灵
单文波
欧阳砚池
李永韬
陈紫杰
李玉
杨帝海
黄炜康
刘海波
孙继东
翟志芳
许钧发
何俊池
李震
孙裕
刘轶斌
马侠霖
陈剑锋
梁湘武
陈诗杨
冯腾霄
章效培
胡长鸿
刘太平
李超
周巍
尹兴伟
何煦
林志达
姚专
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910849663.3A priority Critical patent/CN110473328B/en
Publication of CN110473328A publication Critical patent/CN110473328A/en
Application granted granted Critical
Publication of CN110473328B publication Critical patent/CN110473328B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/60Indexing scheme relating to groups G07C9/00174 - G07C9/00944
    • G07C2209/63Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The disclosure provides a kind of community's access control management method and device, electronic equipment, storage medium;It is related to field of artificial intelligence.Community's access control management method includes: to occur target object in target area in response to detecting, obtains the corresponding identification information of the target object;Intellectual analysis processing is carried out to the identification information of the target object, determines the corresponding Permission Levels data of the target object;The corresponding prevailing state data of the target object are determined according to the Permission Levels data, to control the switch state of community gate inhibition by the prevailing state data.The disclosure can make owner, visitor and extraneous services personnel more convenient when passing in and out community, improve the safety of community, promote the usage experience of user.

Description

Community's access control management method and device, storage medium, electronic equipment
Technical field
This disclosure relates to field of artificial intelligence, in particular to a kind of community's access control management method, community gate inhibition Managing device, electronic equipment and computer readable storage medium.
Background technique
With the rapid development of network technology, things in people's life also increasingly with network close association.Community's door Guarantee of the access control system as a community, safety are increasingly valued by people.
Currently, most of existing access control system is opened the door by way of access card or key, this scheme In the presence of leaving behind access card or key, the risk that cannot be entered, and go to open the door before needing owner when there is visitor, owner experiences It is poor;Sometimes can also there are access card or a key loss, and the risk that may be usurped by criminal, safety are poor.
It should be noted that information is only used for reinforcing the reason to the background of the disclosure disclosed in above-mentioned background technology part Solution, therefore may include the information not constituted to the prior art known to persons of ordinary skill in the art.
Summary of the invention
The disclosure be designed to provide a kind of community's access control management method, community's gate inhibition management apparatus, electronic equipment with And computer readable storage medium, and then caused by overcoming the limitation and defect due to the relevant technologies to a certain extent, it is existing Some access cards or key enabling lead to the problem that owner experiences are poor and safety is lower.
According to the disclosure in a first aspect, providing a kind of community's access control management method, comprising:
Occur target object in target area in response to detecting, obtains the corresponding identification information of the target object;
Intellectual analysis processing is carried out to the identification information of the target object, determines the corresponding power of the target object Limit level data;
The corresponding prevailing state data of the target object are determined according to the Permission Levels data, to pass through the passage The switch state of status data control community gate inhibition.
In a kind of exemplary embodiment of the disclosure, the identification information includes face characteristic data, the acquisition institute Stating the corresponding identification information of target object includes:
Obtain the corresponding facial image of the target object;
Feature extraction is carried out to the facial image according to the Feature Selection Model of pre-training, determines the target object pair The face characteristic data answered are with the corresponding identification information of target object according to the face characteristic data creation.
In a kind of exemplary embodiment of the disclosure, the identification information includes industrial characteristic data, the acquisition institute Stating the corresponding identification information of target object includes:
Obtain the corresponding dress ornament image of the target object;
Feature identification is carried out to the dress ornament image according to the industry identification model of pre-training, determines the target object pair The industrial characteristic data answered are with the corresponding identification information of target object according to the industrial characteristic data creation.
In a kind of exemplary embodiment of the disclosure, after obtaining the corresponding identification information of the target object, institute State method further include:
The corresponding credit score data of the target object are created according to the identification information, and pass through the credit score The corresponding Permission Levels data of target object described in data point reuse;And
The corresponding credit score data of the target object and the Permission Levels data are uploaded into block chain It is stored.
In a kind of exemplary embodiment of the disclosure, the target object pair is being determined according to the Permission Levels data The prevailing state data answered, after through the switch state of prevailing state data control community gate inhibition, the method is also Include:
Obtain the motion profile and run duration of the target object;
The corresponding current credit score number of the target object is calculated according to the motion profile and the run duration The credit score data of the target object are updated according to the current credit score data accordingly.
In a kind of exemplary embodiment of the disclosure, according to the motion profile and run duration calculating The corresponding current credit score data of target object are to update the institute of the target object according to the current credit score data State credit score data further include:
It obtains and the associated motion profile for following object of the target object and run duration;
The corresponding current credit of the target object is calculated according to the motion profile for following object and run duration Integration data is to update the credit score data of the target object according to the current credit score data.
In a kind of exemplary embodiment of the disclosure, determine that the target object is corresponding according to the Permission Levels data Prevailing state data further include:
If the Permission Levels data of the target object are lower than predetermined level, the target object is guided to be visited Ask request operation;
It obtains the access request and operates corresponding return information, to determine the target object according to the return information Corresponding prevailing state data;Wherein, the return information includes customized return information.
According to the second aspect of the disclosure, a kind of community's gate inhibition management apparatus is provided, comprising:
Identification information obtains module and obtains the target for occurring target object in target area in response to detecting The corresponding identification information of object;
Permission Levels data determining module carries out at intellectual analysis for the identification information to the target object Reason, determines the corresponding Permission Levels data of the target object;
Community's access control module, for determining the corresponding current shape of the target object according to the Permission Levels data State data, to control the switch state of community gate inhibition by the prevailing state data.
In a kind of exemplary embodiment of the disclosure, the identification information obtains module and includes:
Obtain the corresponding facial image of the target object;
Feature extraction is carried out to the facial image according to the Feature Selection Model of pre-training, determines the target object pair The face characteristic data answered are with the corresponding identification information of target object according to the face characteristic data creation.
In a kind of exemplary embodiment of the disclosure, the identification information obtains module and includes:
Obtain the corresponding dress ornament image of the target object;
Feature identification is carried out to the dress ornament image according to the industry identification model of pre-training, determines the target object pair The industrial characteristic data answered are with the corresponding identification information of target object according to the industrial characteristic data creation.
In a kind of exemplary embodiment of the disclosure, community's gate inhibition management apparatus further includes credit score data wound Unit is built, the credit score data creating unit is configured as:
The corresponding credit score data of the target object are created according to the identification information, and pass through the credit score The corresponding Permission Levels data of target object described in data point reuse;And
The corresponding credit score data of the target object and the Permission Levels data are uploaded into block chain It is stored.
In a kind of exemplary embodiment of the disclosure, community's gate inhibition management apparatus further include credit score data more New unit, the credit score data updating unit are configured as:
Obtain the motion profile and run duration of the target object;
The corresponding current credit score number of the target object is calculated according to the motion profile and the run duration The credit score data of the target object are updated according to the current credit score data accordingly.
In a kind of exemplary embodiment of the disclosure, the credit score data updating unit is also configured to
It obtains and the associated motion profile for following object of the target object and run duration;
The corresponding current credit of the target object is calculated according to the motion profile for following object and run duration Integration data is to update the credit score data of the target object according to the current credit score data.
In a kind of exemplary embodiment of the disclosure, community's access control module includes:
If the Permission Levels data of the target object are lower than predetermined level, the target object is guided to be visited Ask request operation;
It obtains the access request and operates corresponding return information, to determine the target object according to the return information Corresponding prevailing state data;Wherein, the return information includes customized return information.
According to the third aspect of the disclosure, a kind of electronic equipment is provided, comprising: processor;And memory, for storing The executable instruction of the processor;Wherein, the processor is configured to above-mentioned to execute via the executable instruction is executed Method described in any one.
According to the fourth aspect of the disclosure, a kind of computer readable storage medium is provided, computer program is stored thereon with, The computer program realizes method described in above-mentioned any one when being executed by processor.
Disclosure exemplary embodiment can have it is following partly or entirely the utility model has the advantages that
In community's access control management method provided by an example embodiment of the disclosure, it is corresponding to obtain target object Identification information;Intellectual analysis processing is carried out to the identification information of target object, determines corresponding Permission Levels data;According to permission Level data determines the corresponding prevailing state data of target object, to control the switch shape of community gate inhibition by prevailing state data State.On the one hand, the switch state that community gate inhibition is controlled according to the identification information of target object, can be according to the feature of target object The accurately switch of access control does not need relevant access card or key, keeps target object disengaging community gate inhibition more square Just quick, promote usage experience;On the other hand, the Permission Levels number of target object is determined by the identification information of target object According to, according to Permission Levels data control community gate inhibition switch state, can distinguish the Permission Levels data of different crowd and to The convenience of different crowd disengaging community gate inhibition is not influenced while improving the safety of community gate inhibition from different permissions, Further promote the usage experience of user.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure Example, and together with specification for explaining the principles of this disclosure.It should be evident that the accompanying drawings in the following description is only the disclosure Some embodiments for those of ordinary skill in the art without creative efforts, can also basis These attached drawings obtain other attached drawings.
Fig. 1 is shown can be using a kind of community's access control management method of the embodiment of the present disclosure and the exemplary system of device The schematic diagram of framework;
Fig. 2 shows the structural schematic diagrams of the computer system of the electronic equipment suitable for being used to realize the embodiment of the present disclosure;
Fig. 3 diagrammatically illustrates the flow diagram of community's access control management method according to one embodiment of the disclosure;
Fig. 4 diagrammatically illustrates the schematic diagram of the data-sharing systems of one embodiment according to the disclosure;
Fig. 5 diagrammatically illustrates the corresponding area of each node in the data-sharing systems according to one embodiment of the disclosure The schematic diagram of block chain;
Fig. 6 diagrammatically illustrates the signal that block generates in the data-sharing systems according to one embodiment of the disclosure Figure;
Fig. 7 diagrammatically illustrates the flow diagram updated according to the credit score data of one embodiment of the disclosure;
Fig. 8 diagrammatically illustrates the process signal according to the identification of the extraneous services personnel identity of one embodiment of the disclosure Figure;
Fig. 9 diagrammatically illustrates the signal of community's access control management method general frame according to one embodiment of the disclosure Figure;
Figure 10 diagrammatically illustrates the schematic block diagram of community's gate inhibition management apparatus according to one embodiment of the disclosure.
Specific embodiment
Example embodiment is described more fully with reference to the drawings.However, example embodiment can be with a variety of shapes Formula is implemented, and is not understood as limited to example set forth herein;On the contrary, thesing embodiments are provided so that the disclosure will more Fully and completely, and by the design of example embodiment comprehensively it is communicated to those skilled in the art.Described feature, knot Structure or characteristic can be incorporated in any suitable manner in one or more embodiments.In the following description, it provides perhaps More details fully understand embodiment of the present disclosure to provide.It will be appreciated, however, by one skilled in the art that can It is omitted with technical solution of the disclosure one or more in the specific detail, or others side can be used Method, constituent element, device, step etc..In other cases, be not shown in detail or describe known solution to avoid a presumptuous guest usurps the role of the host and So that all aspects of this disclosure thicken.
In addition, attached drawing is only the schematic illustrations of the disclosure, it is not necessarily drawn to scale.Identical attached drawing mark in figure Note indicates same or similar part, thus will omit repetition thereof.Some block diagrams shown in the drawings are function Energy entity, not necessarily must be corresponding with physically or logically independent entity.These function can be realized using software form Energy entity, or these functional entitys are realized in one or more hardware modules or integrated circuit, or at heterogeneous networks and/or place These functional entitys are realized in reason device device and/or microcontroller device.
Fig. 1 is shown can be using a kind of community's access control management method of the embodiment of the present disclosure and the exemplary application of device The schematic diagram of the system architecture of environment.
As shown in Figure 1, system architecture 100 may include one or more of terminal device 101,102,103, network 104 and server 105.Network 104 between terminal device 101,102,103 and server 105 to provide communication link Medium.Network 104 may include various connection types, such as wired, wireless communication link or fiber optic cables etc..Terminal is set Standby 101,102,103 can be the various electronic equipments with display screen, including but not limited to desktop computer, portable computing Machine, smart phone and tablet computer etc..It should be understood that the number of terminal device, network and server in Fig. 1 is only to show Meaning property.According to needs are realized, any number of terminal device, network and server can have.For example server 105 can be with It is the server cluster etc. of multiple server compositions.
Community's access control management method provided by the embodiment of the present disclosure is generally executed by server 105, correspondingly, community's door Prohibit managing device to be generally positioned in server 105.But it will be readily appreciated by those skilled in the art that the embodiment of the present disclosure is mentioned Community's access control management method of confession can also be executed by terminal device 101,102,103, correspondingly, community's gate inhibition management apparatus It can be set in terminal device 101,102,103, do not do particular determination in the present exemplary embodiment to this.For example, In In a kind of exemplary embodiment, it can be user by terminal device 101,102,103 and identification information be uploaded to server 105, communications state data is transferred to terminal by community's access control management method provided by the embodiment of the present disclosure and set by server Standby 101,102,103 etc..
Fig. 2 shows the structural schematic diagrams of the computer system of the electronic equipment suitable for being used to realize the embodiment of the present disclosure.
It should be noted that Fig. 2 shows the computer system 200 of electronic equipment be only an example, should not be to this public affairs The function and use scope for opening embodiment bring any restrictions.
As shown in Fig. 2, computer system 200 includes central processing unit (CPU) 201, it can be read-only according to being stored in Program in memory (ROM) 202 or be loaded into the program in random access storage device (RAM) 203 from storage section 208 and Execute various movements appropriate and processing.In RAM 203, it is also stored with various programs and data needed for system operatio.CPU 201, ROM 202 and RAM 203 is connected with each other by bus 204.Input/output (I/O) interface 205 is also connected to bus 204。
I/O interface 205 is connected to lower component: the importation 206 including keyboard, mouse etc.;It is penetrated including such as cathode The output par, c 207 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 208 including hard disk etc.; And the communications portion 209 of the network interface card including LAN card, modem etc..Communications portion 209 via such as because The network of spy's net executes communication process.Driver 210 is also connected to I/O interface 205 as needed.Detachable media 211, such as Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 210, in order to read from thereon Computer program be mounted into storage section 208 as needed.
Particularly, in accordance with an embodiment of the present disclosure, it may be implemented as computer below with reference to the process of flow chart description Software program.For example, embodiment of the disclosure includes a kind of computer program product comprising be carried on computer-readable medium On computer program, which includes the program code for method shown in execution flow chart.In such reality It applies in example, which can be downloaded and installed from network by communications portion 209, and/or from detachable media 211 are mounted.When the computer program is executed by central processing unit (CPU) 201, execute in the present processes and device The various functions of limiting.In some embodiments, computer system 200 can also include AI (Artificial Intelligence, artificial intelligence) processor, the AI processor is for handling the calculating operation in relation to machine learning.
It should be noted that computer-readable medium shown in the disclosure can be computer-readable signal media or meter Calculation machine readable storage medium storing program for executing either the two any combination.Computer readable storage medium for example can be --- but not Be limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or any above combination.Meter The more specific example of calculation machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, just of one or more conducting wires Taking formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type may be programmed read-only storage Device (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device, Or above-mentioned any appropriate combination.In the disclosure, computer readable storage medium can be it is any include or storage journey The tangible medium of sequence, the program can be commanded execution system, device or device use or in connection.And at this In open, computer-readable signal media may include in a base band or as the data-signal that carrier wave a part is propagated, Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including but unlimited In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for By the use of instruction execution system, device or device or program in connection.Include on computer-readable medium Program code can transmit with any suitable medium, including but not limited to: wireless, electric wire, optical cable, RF etc. are above-mentioned Any appropriate combination.
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of above-mentioned module, program segment or code include one or more Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical On can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it wants It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction It closes to realize.
Being described in unit involved in the embodiment of the present disclosure can be realized by way of software, can also be by hard The mode of part realizes that described unit also can be set in the processor.Wherein, the title of these units is in certain situation Under do not constitute restriction to the unit itself.
As on the other hand, present invention also provides a kind of computer-readable medium, which be can be Included in electronic equipment described in above-described embodiment;It is also possible to individualism, and without in the supplying electronic equipment. Above-mentioned computer-readable medium carries one or more program, when the electronics is set by one for said one or multiple programs When standby execution, so that method described in electronic equipment realization as the following examples.For example, the electronic equipment can be real Now such as Fig. 3, Fig. 7, each step shown in Fig. 8.
The technical solution of the embodiment of the present disclosure is described in detail below:
In current community's entrance guard management scheme, most of is by access card or key opens the door or recognition of face brush Face is entered.But need to carry key or access card in through the access card scheme that perhaps key opens the door, exist Access card is left behind, the experience of the risk that cannot be entered, owner is poor;Secondly traditional key or access card open the door, with It is highly inconvenient that body carries these articles;And respondent owner is needed downstairs to open the door when having visitor;Access card is easy to lose It loses or utilization is stolen by illegal person, the safety of community is severely impacted.In the side to be entered by recognition of face brush face In case, user is needed to shift to an earlier date registered face information, not registered then unavailable;The accuracy of recognition of face is poor;External visitor Unfriendly, visitor does not have face information that cannot enter;It is unfriendly to external attendant, for example take-away person not can enter cell, Reduce efficiency.
Based on said one or multiple problems, this example embodiment provides a kind of community's access control management method.The society Area's access control management method can be applied to above-mentioned server 105, also can be applied in above-mentioned terminal device 101,102,103 One or more does not do particular determination to this in the present exemplary embodiment.In server 105 (cloud) in this example embodiment It is illustrated for execution this method, refering to what is shown in Fig. 3, community's access control management method may comprise steps of S310 to step Rapid S330:
Step S310, occur target object in target area in response to detecting, obtain the corresponding mark of the target object Know information;
Step S320, intellectual analysis processing is carried out to the identification information of the target object, determines the target pair As corresponding Permission Levels data;
Step S330, the corresponding prevailing state data of the target object are determined according to the Permission Levels data, with logical Cross the switch state of the prevailing state data control community gate inhibition.
In community's access control management method provided by this example embodiment, on the one hand, according to the mark of target object Information controls the switch state of community gate inhibition, can not be needed according to the switch of the feature of target object accurately access control Relevant access card or key keep target object disengaging community gate inhibition more convenient, promote usage experience;Another party Face determines the Permission Levels data of target object by the identification information of target object, controls community according to Permission Levels data The switch state of gate inhibition can distinguish the Permission Levels data of different crowd and give different permissions, improve community gate inhibition Safety while, do not influence different crowd disengaging community gate inhibition convenience, further promoted user usage experience.
In the following, the above-mentioned steps for this example embodiment are described in more details.
In step s310, occur target object in target area in response to detecting, it is corresponding to obtain the target object Identification information.
In one example embodiment of the disclosure, target area can refer to that developer or administrative staff preset , detection range for carrying out target object identification, such as target area can be community gate inhibition three meters of circle nearby Shape region is also possible to the fan-shaped region of first three meter of community gate inhibition, and certainly, target area can also be other ranges and shape Region, concrete condition developer or administrative staff can carry out customized setting according to ambient enviroment, this example is implemented Example is not particularly limited this.By the parameter different for setting of the varying environment to target area, target can improved While the accuracy of object identity identification, the energy consumption of detection system is saved.
Target object can refer to that community gate inhibition nearby has intention the object by gate inhibition, such as target object can be society Owner in area, is also possible to visitor, can also be extraneous services personnel, this example embodiment does not do particular determination to this.Tool Body can be by being intended to analysis model with motion profile of the target object in target area and towards judging target object Whether intentional community gate inhibition is passed through.Identification information can be the information for referring to characterization target object identity information, such as mark Knowing information can be the face characteristic data of target object, be also possible to the resemblances such as the height and weight of target object, certainly, Identification information can also be the garment ornament of wearing of target object, this example embodiment does not do particular determination to this.
Specifically, obtaining the corresponding facial image of target object;According to the Feature Selection Model of pre-training to facial image Feature extraction is carried out, determines the corresponding face characteristic data of target object with corresponding according to face characteristic data creation target object Identification information.Facial image can refer to by with Intelligent human-face detect camera acquisition into the mesh in target zone Mark the face image of object.Feature Selection Model can refer to that trains in advance can extract the corresponding characteristic information of facial image Model, such as Feature Selection Model can be the convolutional neural networks model with feature extraction functions, certainly, feature extraction Model can also be other learning models with feature extraction functions, this example embodiment is not limited.Face characteristic number According to the corresponding characteristic of facial image that can refer to the target object extracted by Feature Selection Model, by face characteristic number According to the identification information as target object.
Specifically, obtaining the corresponding dress ornament image of the target object;According to the industry identification model of pre-training to described Dress ornament image carries out feature identification, determines the corresponding industrial characteristic data of the target object according to the industrial characteristic data Create the corresponding identification information of the target object.Dress ornament image can refer to by having intelligent dress ornament to detect camera acquisition The image for wearing dress ornament into the target object in target zone, industry identification model can refer in advance training can The model of the corresponding garment ornament information of dress ornament image is extracted, to judge the corresponding industry of dress ornament image according to garment ornament information Information, such as industry identification model can be the convolutional neural networks model with garment ornament extraction and classification feature, when So, industry identification model can also be that other are extracted with garment ornament and the learning model of classification feature, this example are implemented Example is not limited.Such as include the identification pattern of certain industry in garment ornament information, it is determined that target object is the sector Attendant.Industrial characteristic data can refer to the target by industry identification model by the dress ornament image recognition of target object The corresponding industry of object, using industrial characteristic data as the identification information of target object.
In step s 320, intellectual analysis processing is carried out to the identification information of the target object, determines the mesh Mark the corresponding Permission Levels data of object.
In one example embodiment of the disclosure, intellectual analysis processing can refer to the identification information according to target object (such as face characteristic data, industrial characteristic data, body type data etc.), the processing that the identity information of target object is determined Process.Permission Levels data, which can refer to, carries out the target object obtained after intellectual analysis processing to the identification information of target object The corresponding permission of identity, such as Permission Levels data can be owner's permission, be also possible to visitor's permission, certainly, permission etc. Grade data can also be extraneous services personnel's permission, only schematically illustrate herein, this example embodiment does not do special limit to this It is fixed.
Further, the corresponding credit score data of target object are created according to identification information, and passes through credit score number According to the corresponding Permission Levels data of adjustment target object;And by the corresponding credit score data of target object and Permission Levels Data upload to block chain and are stored.Credit score data can refer to characterization target object to the degree of danger of Community Safety Data, for example, when the target object that permission level data is visitor's permission repeatedly enters in community, and do not make and any having The event for damaging Community Safety, can promote the credit score data of target object;Opposite, if the Permission Levels of target object Data are visitor's permission, but abnormal behavior of the target object in community, and are handled by intellectual analysis and determine target object When having certain influence to Community Safety, the credit score data of target object are reduced.
It can refer to the letter in target object by the corresponding Permission Levels data of credit score data point reuse target object According to the corresponding Permission Levels data of credit score data point reuse target object, example when being more than preset threshold with integration data variation It, will such as when the amplitude that the credit score data for the target object that permission level data is visitor's permission are promoted is more than preset threshold Visitor's permission (need to request and can just open community gate inhibition after the owner of owner's permission agrees to) of target object upgrades to Resident visitor (not needing to make requests);Opposite, when the credit score for the target object that permission level data is visitor's permission When the amplitude of data decline is more than preset threshold, visitor's permission of target object (is needed to request and in the owner of owner's permission Community gate inhibition can be just opened after agreement) under be adjusted to dangerous visitor (need to make requests and need administrative staff agree to after Community gate inhibition can be opened).
The corresponding credit score data of target object and Permission Levels data are finally uploaded to block chain to store, It can guarantee that credit score data and Permission Levels data can not distort, guarantee the safety of data.
Specifically, data-sharing systems shown in Figure 4, data-sharing systems 400 refer to for carrying out node and section The system of data sharing between point, may include multiple nodes 401 in the data-sharing systems, multiple nodes 401 can refer to Each client in data-sharing systems.Each node 401 can receive input information work normally, and based on connecing The shared data in input maintenance of information data-sharing systems received.In order to guarantee that the information in data-sharing systems is mutual Logical, there may be information to connect between each node in data-sharing systems, can be connected by above- mentioned information between node Carry out information transmission.For example, when the arbitrary node in data-sharing systems receives different vertical domain knowledge maps, number The vertical domain knowledge map is just obtained according to common recognition algorithm according to other nodes in shared system, by the vertical domain knowledge figure Spectrum is stored as the data in shared data, so that the data stored on whole nodes in data-sharing systems are consistent.
For each node in data-sharing systems, corresponding node identification, and data sharing system are all had Each node in system can store the node identification of other nodes in data-sharing systems, so as to subsequent according to other sections The block of generation, is broadcasted other nodes into data-sharing systems by the node identification of point.One can be safeguarded in each node Node identification list as shown in the table stores nodename and node identification correspondence into the node identification list.Wherein, Node identification can for (Internet Protocol, the agreement interconnected between the network) address IP and other any can use It is only illustrated by taking IP address as an example in the information for identifying the node, table 1.
1 node identification of table
Nodename Node identification
Node 1 117.114.151.174
Node 2 117.116.189.145
Node N 119.123.789.258
Each node in data-sharing systems stores an identical block chain.Block chain is made of multiple blocks, Shown in Figure 5, block chain is made of multiple blocks, and originating includes block head and block main body in block, is stored in block head Information characteristics value, version number, timestamp and difficulty value are inputted, is stored with input information in block main body;Next area of original block Block, for father's block, is equally included block head and block main body in next block, is stored with current block in block head with original block Input information characteristics value, father's block block head characteristic value, version number, timestamp and difficulty value, and so on so that area The block data stored in each block in block chain, which exists with the block data stored in father's block, to be associated with, and ensure that in block Input the safety of information.
Shown in Figure 6 when generating each block in block chain, the node where block chain is receiving input letter When breath, input information is verified, after completing verification, input information is stored into memory pool, and update it and be used to record Input the Hash tree of information;Later, renewal time stamp is updated to receive the time of input information, and attempted different random Number repeatedly carries out characteristic value calculating, so that the characteristic value being calculated can satisfy following formula (1):
Wherein, SHA256 is to calculate feature value-based algorithm used in characteristic value;Version (version number) is related in block chain The version information of block agreement;Prev_hash is the block head characteristic value of father's block of current block;Merkle_root is defeated Enter the characteristic value of information;Ntime is the renewal time of renewal time stamp;Nbits is current difficulty, is whithin a period of time fixed Value, and be determined again after beyond fixed time period;X is random number;TARGET is characterized value threshold value, this feature value threshold value It can be obtained according to nbits determination.
In this way, the corresponding storage of information can be generated block when the random number for meeting above-mentioned formula (1) is calculated Head and block main body, obtain current block.Then, node where block chain is according to the nodes of other nodes in data-sharing systems Mark, other nodes newly-generated block being sent respectively in the data-sharing systems where it, by other nodes to new The block of generation is verified, and is added to newly-generated block in the block chain of its storage after completing verification.
Further, the motion profile and run duration of target object are obtained;According to motion profile and run duration The corresponding current credit score data of target object are calculated to update the credit product of target object according to current credit score data Divided data.Motion profile can be the motion path for referring to target object after entering community in community scope, according to the fortune The dangerous tendency of dynamic trajectory analysis target object, for example, if motion profile of the target object in community shows it always in building It hovers, and the motion profile at parked vehicle is more intensive, is then carried out by the motion profile to the target object outside Intellectual analysis processing determines that the motion profile has dangerous tendency, reduces its credit score data.Run duration can refer to The corresponding run duration of the motion profile of target object, similarly, according to the dangerous tendency of the motion trail analysis target object, For example, if run duration of the target object in community outside building is far longer than the run duration in building, and rest on the vehicles The run duration of park is longer, then carries out intellectual analysis processing by the motion profile to the target object and determine the movement rail Mark has dangerous tendency, reduces its credit score data.Current credit score data can refer to the history according to target object The credit score data for the target object that credit score data and current motion profile, run duration recalculate.
In step S330, the corresponding prevailing state data of the target object are determined according to the Permission Levels data, To control the switch state of community gate inhibition by the prevailing state data.
In one example embodiment of the disclosure, prevailing state data can be the Permission Levels data pair for referring to target object The prevailing state answered, for example, if the Permission Levels data of target object are that proprietary equity is prescribed a time limit, corresponding prevailing state data can To be to let pass at once;If the Permission Levels data of target object are visitor's permissions, corresponding prevailing state data be can be It lets pass after interviewed owner agrees to;It is corresponding logical if the Permission Levels data of target object are extraneous services personnel's permissions Row status data, which can be, to be notified administrative staff and lets pass.The switch state of community gate inhibition refers to that community gate inhibition's beats on or off It closes, the clearance or entrance of corresponding prevailing state data.
Optionally, it obtains and the associated motion profile for following object of target object and run duration;According to following pair The motion profile and run duration of elephant calculate the corresponding current credit score data of target object according to current credit score The credit score data of data update target object.It follows object that can refer to and follows Permission Levels data or credit product The higher target object of divided data enters the Permission Levels data or the lower object of credit score data of community, at this time can be with Think that target object is the guarantor for following object.It therefore can be according to according to the motion profile and run duration for following object The corresponding current credit score data of target object are calculated to update the letter of target object according to current credit score data Use integration data.By the Permission Levels data of target object or credit score data are associated with it that object is followed to tie up It is fixed, further ensure the safety of community.
Optionally, if the Permission Levels data of target object are lower than predetermined level, guiding target object, which accesses, is asked Ask operation;It obtains access request and operates corresponding return information, to determine the corresponding current shape of target object according to return information State data;Wherein, return information includes customized return information.Predetermined level can refer to pre-set binding authority grade The data that the lower target object of data enters, for example, predetermined level can be owner's Permission Levels in this example embodiment, Lower than owner's Permission Levels visitor's permission needs access request operation.Access request operation can refer to Permission Levels number It needs to make requests to the owner of access into community according to the target object lower than predetermined level.Return information can refer to response It can be owner in the data that access request operation returns, such as return information and see the data replied after access request, certainly, Return information can also be that the data of other forms, this example embodiment are not limited.It may include customized for replying data Return information, customized return information can refer to the information for the response access request that owner is arranged in advance, such as owner can be with Setting do not disturb the period, or setting owner stay out please make another appointment ask information for instructions.For extraneous services personnel, cloud service The rule that can be defined according to owner calculates the best window of opportunity for allowing attendant to enter, and is only signal herein certainly Property explanation, any particular determination should not be caused to this example embodiment.
Fig. 7 diagrammatically illustrates the flow diagram updated according to the credit score data of one embodiment of the disclosure.
Refering to what is shown in Fig. 7, step S710 captures target object in community after target object enters community by gate inhibition Action trail;Step S720 records the motion profile and the corresponding run duration of motion profile of target object;Step S730 determines the identity information of target object according to the motion profile of target object and run duration, and according to motion profile And the corresponding run duration of motion profile determines the dangerous tendency data of target object to calculate according to the dangerous tendency data The current credit score data of target object;It is corresponding to update target object according to the identity information of target object by step S740 Personal information library and update corresponding credit score data according to the current credit score data of target object.
Fig. 8 diagrammatically illustrates the process signal according to the identification of the extraneous services personnel identity of one embodiment of the disclosure Figure.
Refering to what is shown in Fig. 8, step S810, captures the dress ornament information and figure information of target object, and extract dress ornament spy Reference breath and behavior characteristic information;Step S820 judges mesh according to the garment ornament information and behavior characteristic information of extraction Whether mark object dresses industry work clothes, no to then follow the steps if not dressing industry work clothes thens follow the steps S830 S840;Step S830 continues to judge whether target object is owner if not dressing industry work clothes, if it is execute Step S850, it is no to then follow the steps S860;Step S840 continues to judge target if target object dresses industry work clothes Whether the behavioural characteristic of object is consistent with industrial characteristic, no to then follow the steps S860 if it is thening follow the steps S850;Step S850 updates personal information library and the credit score data of target object;Step S860 closes gate inhibition, forbids target object Into community;Step S870 opens gate inhibition, and target object is allowed to enter community.
Fig. 9 diagrammatically illustrates the signal of community's access control management method general frame according to one embodiment of the disclosure Figure.
Refering to what is shown in Fig. 9, step S910, by the AI algorithm in cloud to target object carry out trajectory track, recognition of face, Behavioral value, garments worn analysis etc.;Step S920 carries out trajectory track, people to target object according to cloud in step S910 It is that face identification, behavioral value, garments worn are analyzed (such as to differentiate target as a result, differentiated to the identity of target object The identity of object is visitor, owner, extraneous services personnel);Step S930 carries out the target object of different identity by cloud Processing: 1, visitor is handled: visitor, which gets started, to be applied;2, owner establishes portrait (owner's mark);3, extraneous services personnel establish credit Integrating system;4, personnel's perceived distance opens community gate inhibition for there is the target object of enabling permission in advance;Step S940, when It when the judging identity of target object is visitor, needs visitor to send to interviewed owner and requests, beaten after owner confirms visitor's identity It opens the door and prohibits;Step S950, when the judging identity of target object is owner, directly opening gate inhibition lets pass;Step S960, works as target When the judging identity of object is extraneous services personnel, the corresponding credit score data of extraneous services personnel are determined;Step S970, root Judge whether to open the door according to the corresponding credit score data of extraneous services personnel.
It should be noted that although describing each step of method in the disclosure in the accompanying drawings with particular order, this is simultaneously Undesired or hint must execute these steps in this particular order, or have to carry out the ability of step shown in whole Realize desired result.Additional or alternative, it is convenient to omit multiple steps are merged into a step and executed by certain steps, And/or a step is decomposed into execution of multiple steps etc..
Further, in this example embodiment, a kind of community's gate inhibition management apparatus is additionally provided.Community's entrance guard management Device can be applied to a server or terminal device.Refering to what is shown in Fig. 10, community's gate inhibition management apparatus 1000 may include Identification information obtains module 1010, Permission Levels data determining module 1020 and community's access control module 1030.Wherein:
Identification information obtains module 1010, in response to detecting occur target object in target area, described in acquisition The corresponding identification information of target object;
Permission Levels data determining module 1020 carries out intellectual analysis for the identification information to the target object Processing, determines the corresponding Permission Levels data of the target object;
Community's access control module 1030, for determining that the target object is corresponding logical according to the Permission Levels data Row status data, to control the switch state of community gate inhibition by the prevailing state data.
In a kind of exemplary embodiment of the disclosure, the identification information obtains module 1010 and includes:
Obtain the corresponding facial image of the target object;
Feature extraction is carried out to the facial image according to the Feature Selection Model of pre-training, determines the target object pair The face characteristic data answered are with the corresponding identification information of target object according to the face characteristic data creation.
In a kind of exemplary embodiment of the disclosure, the identification information obtains module 1010 and includes:
Obtain the corresponding dress ornament image of the target object;
Feature identification is carried out to the dress ornament image according to the industry identification model of pre-training, determines the target object pair The industrial characteristic data answered are with the corresponding identification information of target object according to the industrial characteristic data creation.
In a kind of exemplary embodiment of the disclosure, community's gate inhibition management apparatus 1000 further includes credit score number According to creating unit, the credit score data creating unit is configured as:
The corresponding credit score data of the target object are created according to the identification information, and pass through the credit score The corresponding Permission Levels data of target object described in data point reuse;And
The corresponding credit score data of the target object and the Permission Levels data are uploaded into block chain It is stored.
In a kind of exemplary embodiment of the disclosure, community's gate inhibition management apparatus 1000 further includes credit score number According to updating unit, the credit score data updating unit is configured as:
Obtain the motion profile and run duration of the target object;
The corresponding current credit score number of the target object is calculated according to the motion profile and the run duration The credit score data of the target object are updated according to the current credit score data accordingly.
In a kind of exemplary embodiment of the disclosure, the credit score data updating unit is also configured to
It obtains and the associated motion profile for following object of the target object and run duration;
The corresponding current credit of the target object is calculated according to the motion profile for following object and run duration Integration data is to update the credit score data of the target object according to the current credit score data.
In a kind of exemplary embodiment of the disclosure, community's access control module 1030 includes:
If the Permission Levels data of the target object are lower than predetermined level, the target object is guided to be visited Ask request operation;
It obtains the access request and operates corresponding return information, to determine the target object according to the return information Corresponding prevailing state data;Wherein, the return information includes customized return information.
Each module or the detail of unit are in corresponding community's entrance guard management in above-mentioned community's gate inhibition management apparatus It is described in detail in method, therefore details are not described herein again.
It should be noted that although being referred to several modules or list for acting the equipment executed in the above detailed description Member, but this division is not enforceable.In fact, according to embodiment of the present disclosure, it is above-described two or more Module or the feature and function of unit can embody in a module or unit.Conversely, an above-described mould The feature and function of block or unit can be to be embodied by multiple modules or unit with further division.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the disclosure Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following Claim is pointed out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.

Claims (10)

1. a kind of community's access control management method characterized by comprising
Occur target object in target area in response to detecting, obtains the corresponding identification information of the target object;
Intellectual analysis processing is carried out to the identification information of the target object, determines corresponding permission of the target object etc. Grade data;
The corresponding prevailing state data of the target object are determined according to the Permission Levels data, to pass through the prevailing state The switch state of data control community gate inhibition.
2. community's access control management method according to claim 1, which is characterized in that the identification information includes face characteristic Data, the corresponding identification information of the target object that obtains include:
Obtain the corresponding facial image of the target object;
Feature extraction is carried out to the facial image according to the Feature Selection Model of pre-training, determines that the target object is corresponding Face characteristic data are with the corresponding identification information of target object according to the face characteristic data creation.
3. community's access control management method according to claim 1, which is characterized in that the identification information includes industrial characteristic Data, the corresponding identification information of the target object that obtains include:
Obtain the corresponding dress ornament image of the target object;
Feature identification is carried out to the dress ornament image according to the industry identification model of pre-training, determines that the target object is corresponding Industrial characteristic data are with the corresponding identification information of target object according to the industrial characteristic data creation.
4. community's access control management method according to claim 1, which is characterized in that obtaining, the target object is corresponding After identification information, the method also includes:
The corresponding credit score data of the target object are created according to the identification information, and pass through the credit score data Adjust the corresponding Permission Levels data of the target object;And
The corresponding credit score data of the target object and the Permission Levels data are uploaded to block chain to carry out Storage.
5. community's access control management method according to claim 4, which is characterized in that true according to the Permission Levels data The corresponding prevailing state data of the target object are determined, to pass through the switch state that the prevailing state data control community gate inhibition Later, the method also includes:
Obtain the motion profile and run duration of the target object;
According to the motion profile and the run duration calculate the corresponding current credit score data of the target object with The credit score data of the target object are updated according to the current credit score data.
6. community's access control management method according to claim 5, which is characterized in that according to the motion profile and described Run duration calculates the corresponding current credit score data of the target object to update according to the current credit score data The credit score data of the target object further include:
It obtains and the associated motion profile for following object of the target object and run duration;
The corresponding current credit score of the target object is calculated according to the motion profile for following object and run duration Data are to update the credit score data of the target object according to the current credit score data.
7. community's access control management method according to claim 1, which is characterized in that determined according to the Permission Levels data The corresponding prevailing state data of the target object further include:
If the Permission Levels data of the target object are lower than predetermined level, guide the target object to access and ask Ask operation;
It obtains the access request and operates corresponding return information, to determine that the target object is corresponding according to the return information Prevailing state data;Wherein, the return information includes customized return information.
8. a kind of community's gate inhibition management apparatus characterized by comprising
Identification information obtains module and obtains the target object for occurring target object in target area in response to detecting Corresponding identification information;
Permission Levels data determining module carries out intellectual analysis processing for the identification information to the target object, really Determine the corresponding Permission Levels data of the target object;
Community's access control module, for determining the corresponding prevailing state number of the target object according to the Permission Levels data According to control the switch state of community gate inhibition by the prevailing state data.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt Claim 1-7 described in any item methods are realized when processor executes.
10. a kind of electronic equipment characterized by comprising
Processor;And
Memory, for storing the executable instruction of the processor;
Wherein, the processor is configured to require 1-7 described in any item via executing the executable instruction and carry out perform claim Method.
CN201910849663.3A 2019-09-09 2019-09-09 Community access control management method and device, storage medium and electronic equipment Active CN110473328B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910849663.3A CN110473328B (en) 2019-09-09 2019-09-09 Community access control management method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910849663.3A CN110473328B (en) 2019-09-09 2019-09-09 Community access control management method and device, storage medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN110473328A true CN110473328A (en) 2019-11-19
CN110473328B CN110473328B (en) 2021-11-05

Family

ID=68515207

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910849663.3A Active CN110473328B (en) 2019-09-09 2019-09-09 Community access control management method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN110473328B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111402471A (en) * 2020-03-05 2020-07-10 慧科(台州)智能系统有限公司 Personnel processing mode determining method and device and data processing platform
CN111429627A (en) * 2020-03-26 2020-07-17 广东中凯智慧政务软件有限公司 Method for checking in and out registration, intelligent terminal, storage medium and monitoring system
CN112037410A (en) * 2020-11-06 2020-12-04 上海兴容信息技术有限公司 Control method and system of intelligent access control
CN112085878A (en) * 2020-09-07 2020-12-15 广州东软科技有限公司 House supervisory systems based on waste classification
CN112183140A (en) * 2020-09-30 2021-01-05 上海创功通讯技术有限公司 Parameter calling method, mobile terminal and system
CN112365643A (en) * 2020-11-16 2021-02-12 深圳市天彦通信股份有限公司 Access area authority management method and related device
CN112465552A (en) * 2020-11-30 2021-03-09 北京云创生活科技有限公司 Community point counting method, device and equipment and readable storage medium
CN113468948A (en) * 2021-04-26 2021-10-01 深圳市安软科技股份有限公司 View data based security and protection control method, module, equipment and storage medium
CN114553474A (en) * 2022-01-07 2022-05-27 南方电网深圳数字电网研究院有限公司 Access control permission control method and device based on Internet of things
CN115083053A (en) * 2022-06-15 2022-09-20 深圳市银河通信科技有限公司 Intelligent community access control system and control method

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1717696A (en) * 2002-11-29 2006-01-04 Vcs国际有限公司 System for processing visual information and method of visual surveillance
EP2555169A2 (en) * 2011-08-02 2013-02-06 ASSA ABLOY Sicherheitstechnik GmbH Terminal de voie de secours avec interface de lecture
CN106373240A (en) * 2016-09-14 2017-02-01 浙江维融电子科技股份有限公司 Intelligent monitoring system of self-service bank and monitoring method thereof
KR101783377B1 (en) * 2016-12-07 2017-10-12 주식회사 포커스에이치엔에스 A security management method using a face recognition algorithm
CN107331003A (en) * 2017-06-22 2017-11-07 厦门劢联科技有限公司 A kind of school dormitory's management system based on recognition of face
CN108230497A (en) * 2017-12-21 2018-06-29 合肥天之通电子商务有限公司 A kind of gate inhibition's safety protection method based on express delivery feature recognition
CN108235321A (en) * 2018-01-03 2018-06-29 深圳正品创想科技有限公司 A kind of intelligence WIFI cut-in methods, device and unmanned shop
US20190087464A1 (en) * 2017-09-21 2019-03-21 Hongfujin Precision Electronics (Tianjin) Co.,Ltd. Regional population management system and method
CN109920178A (en) * 2019-04-08 2019-06-21 深圳市远景达物联网技术有限公司 A kind of unmanned supermarket system
CN109934977A (en) * 2019-02-12 2019-06-25 山西省河道与水库技术中心 A kind of intelligent entrance guard recognition methods suitable for unit of opening to the outside world
CN110009543A (en) * 2019-04-02 2019-07-12 深圳市万物云科技有限公司 Based on artificial intelligence community access control management method and device and system and storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1717696A (en) * 2002-11-29 2006-01-04 Vcs国际有限公司 System for processing visual information and method of visual surveillance
EP2555169A2 (en) * 2011-08-02 2013-02-06 ASSA ABLOY Sicherheitstechnik GmbH Terminal de voie de secours avec interface de lecture
CN106373240A (en) * 2016-09-14 2017-02-01 浙江维融电子科技股份有限公司 Intelligent monitoring system of self-service bank and monitoring method thereof
KR101783377B1 (en) * 2016-12-07 2017-10-12 주식회사 포커스에이치엔에스 A security management method using a face recognition algorithm
CN107331003A (en) * 2017-06-22 2017-11-07 厦门劢联科技有限公司 A kind of school dormitory's management system based on recognition of face
US20190087464A1 (en) * 2017-09-21 2019-03-21 Hongfujin Precision Electronics (Tianjin) Co.,Ltd. Regional population management system and method
CN108230497A (en) * 2017-12-21 2018-06-29 合肥天之通电子商务有限公司 A kind of gate inhibition's safety protection method based on express delivery feature recognition
CN108235321A (en) * 2018-01-03 2018-06-29 深圳正品创想科技有限公司 A kind of intelligence WIFI cut-in methods, device and unmanned shop
CN109934977A (en) * 2019-02-12 2019-06-25 山西省河道与水库技术中心 A kind of intelligent entrance guard recognition methods suitable for unit of opening to the outside world
CN110009543A (en) * 2019-04-02 2019-07-12 深圳市万物云科技有限公司 Based on artificial intelligence community access control management method and device and system and storage medium
CN109920178A (en) * 2019-04-08 2019-06-21 深圳市远景达物联网技术有限公司 A kind of unmanned supermarket system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
李绍军: "《物流信息技术》", 30 June 2018 *
王永升: "出入口控制在智慧社区建设中的应用", 《中国安防》 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111402471A (en) * 2020-03-05 2020-07-10 慧科(台州)智能系统有限公司 Personnel processing mode determining method and device and data processing platform
CN111429627A (en) * 2020-03-26 2020-07-17 广东中凯智慧政务软件有限公司 Method for checking in and out registration, intelligent terminal, storage medium and monitoring system
CN112085878A (en) * 2020-09-07 2020-12-15 广州东软科技有限公司 House supervisory systems based on waste classification
CN112183140B (en) * 2020-09-30 2024-05-14 上海创功通讯技术有限公司 Parameter calling method, mobile terminal and system
CN112183140A (en) * 2020-09-30 2021-01-05 上海创功通讯技术有限公司 Parameter calling method, mobile terminal and system
CN112037410A (en) * 2020-11-06 2020-12-04 上海兴容信息技术有限公司 Control method and system of intelligent access control
CN112365643A (en) * 2020-11-16 2021-02-12 深圳市天彦通信股份有限公司 Access area authority management method and related device
CN112465552A (en) * 2020-11-30 2021-03-09 北京云创生活科技有限公司 Community point counting method, device and equipment and readable storage medium
CN113468948B (en) * 2021-04-26 2023-11-10 深圳市安软科技股份有限公司 View data-based security control method, module, equipment and storage medium
CN113468948A (en) * 2021-04-26 2021-10-01 深圳市安软科技股份有限公司 View data based security and protection control method, module, equipment and storage medium
CN114553474A (en) * 2022-01-07 2022-05-27 南方电网深圳数字电网研究院有限公司 Access control permission control method and device based on Internet of things
CN114553474B (en) * 2022-01-07 2023-11-03 南方电网数字平台科技(广东)有限公司 Access control permission control method and device based on Internet of things
CN115083053A (en) * 2022-06-15 2022-09-20 深圳市银河通信科技有限公司 Intelligent community access control system and control method
CN115083053B (en) * 2022-06-15 2023-11-21 深圳市银河通信科技有限公司 Intelligent community access control system and control method

Also Published As

Publication number Publication date
CN110473328B (en) 2021-11-05

Similar Documents

Publication Publication Date Title
CN110473328A (en) Community's access control management method and device, storage medium, electronic equipment
WO2019137050A1 (en) Real-time fraud detection method and device under internet credit scene, and server
CN104240342B (en) Access control method and device based on identity authentication
US10275671B1 (en) Validating identity and/or location from video and/or audio
CN109145781A (en) Method and apparatus for handling image
CN110458154A (en) Face identification method, device and computer readable storage medium
CN104240013B (en) A kind of access control method and access control platform
CN110197315A (en) Methods of risk assessment, device and its storage medium
CN109063920A (en) A kind of transaction risk recognition methods, device and computer equipment
US20060222244A1 (en) Grouping items in video stream images into events
CN108415653A (en) Screen locking method and device for terminal device
CN101657807A (en) Be used for dynamically control to the method and system of the visit of network
CN108269331A (en) A kind of intelligent video big data processing system
CN108596616A (en) User data authenticity analysis method and device, storage medium, electronic equipment
KR102244180B1 (en) Face recognition access control system and method based on automatic face registration and renewal
CN109377104A (en) Data processing method, device, medium and electronic equipment
CN109948320A (en) Identity identification managing method, device, medium and electronic equipment based on block chain
CN111312406B (en) Epidemic situation label data processing method and system
CN108257178A (en) For positioning the method and apparatus of the position of target body
CN108491823A (en) Method and apparatus for generating eye recognition model
CN105637522A (en) World-driven access control using trusted certificates
CN109934191A (en) Information processing method and device
WO2020202694A1 (en) Surveillance system, surveillance device, surveillance method, and non-temporary computer readable medium
CN111199602A (en) Access control method based on personnel big data acquisition and analysis
CN108154111A (en) Biopsy method, system, electronic equipment and computer-readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant