CN110517388A - A kind of entrance guard controlling method and system with security audit - Google Patents
A kind of entrance guard controlling method and system with security audit Download PDFInfo
- Publication number
- CN110517388A CN110517388A CN201910814461.5A CN201910814461A CN110517388A CN 110517388 A CN110517388 A CN 110517388A CN 201910814461 A CN201910814461 A CN 201910814461A CN 110517388 A CN110517388 A CN 110517388A
- Authority
- CN
- China
- Prior art keywords
- log
- user
- building
- management center
- gate inhibition
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 58
- 238000012550 audit Methods 0.000 title claims abstract description 23
- 230000005764 inhibitory process Effects 0.000 claims abstract description 90
- 230000002159 abnormal effect Effects 0.000 claims abstract description 29
- 238000007726 management method Methods 0.000 claims abstract description 26
- 238000001574 biopsy Methods 0.000 claims description 6
- 238000004080 punching Methods 0.000 claims description 6
- 230000005540 biological transmission Effects 0.000 claims 1
- 230000006870 function Effects 0.000 description 4
- 238000001514 detection method Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000001727 in vivo Methods 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000005034 decoration Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/16—Real estate
- G06Q50/163—Real estate management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1365—Matching; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/40—Spoof detection, e.g. liveness detection
- G06V40/45—Detection of the body part being alive
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Human Computer Interaction (AREA)
- General Health & Medical Sciences (AREA)
- Tourism & Hospitality (AREA)
- Human Resources & Organizations (AREA)
- Electromagnetism (AREA)
- Economics (AREA)
- Toxicology (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Artificial Intelligence (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Lock And Its Accessories (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a kind of entrance guard controlling method and systems with security audit, and finger print information to be compared with the standard fingerprint information of pre-stored user fingerprints lane database this method comprises: door access machine receives the finger print information of user's input;If comparing successfully, door access machine opens channel, records log of the user by gate inhibition, user is sent to building's management center by the log of gate inhibition;If comparing failure, abnormal access log is sent to building's management center by door access machine recording exceptional access log;Building's management center receives and shows that user passes through the log or abnormal access log of gate inhibition.This method, which is realized, obtains gate inhibition's log, checks management cell convenient for staff, improves cell security.
Description
Technical field
The present invention relates to gate inhibition's technical fields, more particularly to a kind of access control method with security audit and are
System.
Background technique
Currently, the guard for entrance gate of cell and the gate inhibition of cell gate, are substantially and are come in fact by cell access card IC, ID card
It is existing, it is also more casual to do access card, and may lose, user cannot be distinguished.Some gate inhibitions identify user by fingerprint, but
It is that stranger can not also be known using building manager when gate inhibition, brings many inconvenience to cell management, increases cell peace
Full hidden danger cannot also track the details entered away once ging wrong, and go even with the monitoring video of camera
It distinguishes, but there is no camera, the great challenge that the safety of cell receives in many cells in unit doorway.So due to
Gate inhibition can not be obtained in time and enters and leaves the i.e. gate inhibition's log of information, cannot see whether that stranger enters cell, cell security
It is lower,
Summary of the invention
The object of the present invention is to provide a kind of entrance guard controlling method and systems with security audit, obtain gate inhibition to realize
Log checks management cell convenient for staff, improves cell security.
In order to solve the above technical problems, the present invention provides a kind of access control method with security audit, this method packet
It includes:
Door access machine receives the finger print information of user's input, by the finger print information and pre-stored user fingerprints database
In standard fingerprint information be compared;
If comparing successfully, door access machine opens channel, records log of the user by gate inhibition, the log that user is passed through gate inhibition
It is sent to building's management center;If comparing failure, abnormal access log is sent to property by door access machine recording exceptional access log
Administrative center;
Building's management center receives and shows that the user passes through the log or the abnormal access log of gate inhibition.
Preferably, the method also includes:
Door access machine reads the card information of user card punching, by the card information and pre-stored subscriber card information database into
Row compares;
If comparing successfully, door access machine opens channel, records log of the user by gate inhibition, the log that user is passed through gate inhibition
It is sent to building's management center;If comparing failure, abnormal access log is sent to property by door access machine recording exceptional access log
Administrative center.
Preferably, the method also includes:
The interim two dimensional code that door access machine scanning user shows, is sent to building's management center for interim two dimensional code;
Building's management center verifies whether the interim two dimensional code is the two dimensional code of owner's generation, if so, sending out to door access machine
Send unlatching channel instruction;If it is not, recording exceptional access log.
Preferably, the method also includes:
The face video of door access machine acquisition user is simultaneously uploaded to building's management center;
Building's management center receive face video, by biopsy method and face identification method judge user whether be
Registered user opens channel instruction if so, sending to door access machine;If it is not, recording exceptional access log.
The present invention also provides a kind of access control systems with security audit, for realizing the above method, comprising:
Door access machine, for receiving the finger print information of user's input, by the finger print information and pre-stored user fingerprints
The standard fingerprint information of lane database is compared;If comparing successfully, channel is opened, records log of the user by gate inhibition, it will
User is sent to building's management center by the log of gate inhibition;If comparing failure, recording exceptional access log, by abnormal access day
Will is sent to building's management center;
Building's management center, for receiving and showing log or the abnormal access day of the user by gate inhibition
Will.
Preferably, door access machine is also used to read the card information of user card punching, by the card information and pre-stored user
Card information database is compared;If comparing successfully, channel is opened, log of the user by gate inhibition is recorded, user is passed through into door
The log of taboo is sent to building's management center;If comparing failure, abnormal access log is sent to object by recording exceptional access log
Industry administrative center.
Preferably, door access machine is also used to scan the interim two dimensional code that user shows, and interim two dimensional code is sent to property pipe
Reason center;Building's management center be also used to verify the interim two dimensional code whether be owner generate two dimensional code, if so, to gate inhibition
Machine, which is sent, opens channel instruction;If it is not, recording exceptional access log.
Preferably, door access machine is also used to acquire the face video of user and is uploaded to building's management center;In estate management
The heart is also used to receive face video, judges whether user is registered by biopsy method and face identification method
User opens channel instruction if so, sending to door access machine;If it is not, recording exceptional access log.
A kind of entrance guard controlling method and system with security audit provided by the present invention, door access machine receive user's input
Finger print information, the finger print information is compared with the standard fingerprint information of pre-stored user fingerprints lane database;
If comparing successfully, door access machine opens channel, records log of the user by gate inhibition, user is sent to object by the log of gate inhibition
Industry administrative center;If comparing failure, abnormal access log is sent in estate management by door access machine recording exceptional access log
The heart;Building's management center receives and shows that the user passes through the log or the abnormal access log of gate inhibition.As it can be seen that gate inhibition
Open channel all can record log, building's management center display open the door record be log of the user by gate inhibition, such log
Record can help property personnel effectively to manage entire cell, and when stranger enters, building's management center can also show different
Normal access log checks management cell convenient for property personnel, prevents social idler from coming in destroy cell and corridor environment.Such as
This is able to record all i.e. gate inhibition's logs of log recording for entering and leaving gate inhibition, has security audit by effective management to gate inhibition
Effect, property management personnel can very easily manage cell gate inhibition by these logs, find the entrance of a suspect early
Cell improves cell security, moreover it is possible to provide detailed record to enter and leave the abnormal conditions of cell later, therefore the present invention realizes
Gate inhibition's log is obtained, management cell is checked convenient for staff, improves cell security.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow chart of the access control method with security audit provided by the present invention;
Fig. 2 is the flow chart that property registers access information;
Fig. 3 is access control flow chart;
Fig. 4 is a kind of access control system structural schematic diagram with security audit provided by the present invention.
Specific embodiment
Core of the invention is to provide a kind of entrance guard controlling method and system with security audit, obtains gate inhibition to realize
Log checks management cell convenient for staff, improves cell security.
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention
Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
Referring to FIG. 1, Fig. 1 is a kind of flow chart of the access control method with security audit provided by the present invention,
Method includes the following steps:
S11: door access machine receives the finger print information of user's input, by finger print information and pre-stored user fingerprints database
In standard fingerprint information be compared;
S12: if comparing successfully, door access machine opens channel, records log of the user by gate inhibition, and user is passed through gate inhibition's
Log is sent to building's management center;If comparing failure, abnormal access log is sent to by door access machine recording exceptional access log
Building's management center;
S13: building's management center receives and shows that user passes through the log or abnormal access log of gate inhibition.
As it can be seen that in this method gate inhibition open channel all can record log, building's management center display open the door record i.e. use
Family is by the log of gate inhibition, and such log recording can help property personnel effectively to manage entire cell, when stranger enters
When, building's management center can also show abnormal access log, check management cell convenient for property personnel, prevent social idler
Come in destroy cell and corridor environment.So by effective management to gate inhibition, it is able to record all log notes for entering and leaving gate inhibition
Record is gate inhibition's log, has security audit effect, and property management personnel can very easily manage cell door by these logs
Prohibit, find the entrance cell of a suspect early, improve cell security, moreover it is possible to be provided to enter and leave the abnormal conditions of cell later
Detailed record, therefore this method is realized and obtains gate inhibition's log, checks management cell convenient for staff, improves cell safety
Property.
It is further, further comprising the steps of based on the above method:
S21: door access machine reads the card information of user card punching, by card information and pre-stored subscriber card information database into
Row compares;
S22: if comparing successfully, door access machine opens channel, records log of the user by gate inhibition, and user is passed through gate inhibition's
Log is sent to building's management center;If comparing failure, abnormal access log is sent to by door access machine recording exceptional access log
Building's management center.
Further, the method also includes following steps:
S31: interim two dimensional code is sent to building's management center by the interim two dimensional code that door access machine scanning user shows;
S32: building's management center verifies whether interim two dimensional code is the two dimensional code of owner's generation, if so, sending out to door access machine
Send unlatching channel instruction;If it is not, recording exceptional access log.
Further, the method also includes following steps:
S41: the face video of door access machine acquisition user is simultaneously uploaded to building's management center;
S42: building's management center receives face video, judges that user is by biopsy method and face identification method
It is no for registered user, open channel instruction if so, sending to door access machine;If it is not, recording exceptional access log.
Further, the method also includes: door access machines to receive the door open command and user account that cell phone application is sent, door
User information is sent to building's management center by taboo machine;Building's management center judges whether user account is registered account,
If so, gate inhibition is opened, if it is not, recording exceptional access log.Wherein, after opening gate inhibition further include: record user passes through gate inhibition
Log.
By above method, fingerprint recognition, recognition of face, IC, ID card, interim two dimension can be using gate inhibition's unlocking mode
Code, a variety of unlocking modes of small routine remote unlocking all, unlock each time, all can in Property Management System it is detailed record who
When by what means gate inhibition has been opened, security audit log detailed in this way can help property effectively to manage entirely
Cell prevents social idler from coming in destroy cell and corridor environment.It, can if encountering the dangerous unlocking of doubtful attack
Monitoring alarm also can easily search reason in the later period.
By effective management to gate inhibition, it is able to record all detailed records for entering and leaving gate inhibition, entering and leaving gate inhibition every time has
Detailed security audit log, property management personnel can very easily manage cell gate inhibition by these security audit logs,
The entrance cell for finding a suspect early, into corridor.It prevents society people without fixed duties etc. from swindling into corridor, pastes small advertisement
Equal various actions.And the multifarious method prohibited of opening the door, cell owner can greatly be facilitated to pass in and out cell, prevented without door
The problem of prohibiting card and cannot be introduced into cell.In short, the implementation of this set system, the not only easy access of convenient cell owner, but also
Property management personnel is helped preferably to guarantee the safety of cell, neatly, moreover it is possible to provide in detail to enter and leave the abnormal conditions of cell later
Thin record.
This method is realized that the installation of access control system needs on cell doorway, cell gate doorway by access control system
Door access machine is installed, gate is connected.And these door access machines are connected to Property Management System i.e. building's management center by cell Intranet.
Building's management center has the function of managing gate inhibition, issues owner's register information, identifies face and In vivo detection ability, and remember
The information i.e. user of the detailed disengaging gate inhibition in family is employed by the log of gate inhibition, the connection of these systems is adjusted after leading to, so that it may after
Continuous real work.Wherein, log includes: time, Men Jinming, application method, user, if same to register information, if family
People uses, stranger's face record.
Please referring to 2, Fig. 2 is the flow chart that property registers access information, and owner needs the user of property registration gate inhibition
Method, owner can choose to be unlocked using some of them method, can also all be registered.Wherein, using face and fingerprint, in property
Carry out the acquisition of face and fingerprint;Using NFC, IC, ID card can register detailed information in property, record actual holder,
And register face information;Using wechat small routine, the account information of detailed property system is registered in property, account passes through object
After industry authorization, the face information of owner and household can also be submitted by small routine.After the completion of all information registrations, object
Information can be issued in cell gate inhibition and the gate inhibition of unit mouth by industry system.Owner can use the guard method of registration to pass in and out
Gate inhibition.
Referring to FIG. 3, Fig. 3 is access control flow chart, owner user by registration can use each method into
Gate inhibition out.Wherein, if using IC, ID, NFC swipes the card, and the camera on door access machine can grab out the head portrait for the people that swipes the card, and passes to
In property intranet server, by face identification method judgement swipe the card whether be registration user, if it is directly passing through and
Record the practical log by gate inhibition.If it is not, the household for judging whether it is owner uses, if it is directly passing through and remember
Pass through the log of gate inhibition under record.Both the above situation is not then to be recorded as abnormal conditions, and send one to relevant owner
Item alarm, and owner is asked to confirm whether use is normal.
If the case where whether fingerprint is registration directly compared, passes through door if it is directly passing through and recording using fingerprint
The log of taboo.If it is not, recording exceptional access log.
If door access machine grabs face video using face, passes in midnight intranet server, pass through In vivo detection and people
Face identification, judges whether it is registered user, if it is directly passing through and record the log by gate inhibition.If no
It is recording exceptional access log.
Using wechat small routine, the order opened the door and prohibited is sent by wechat small routine, by cloud transfer, judges to send life
Whether the account of order is registered account, if it is directly passing through and record the log by gate inhibition.If it is not, recording different
Normal access log.
If the interim two dimensional code that owner generates is passed on server and is tested by after door access machine barcode scanning using interim two dimensional code
Whether card is that the two dimensional code that owner generates sends a confirmation message to the owner of generation and inform owner if it is directly passing through
And the log that record passes through gate inhibition.If it is not, recording exceptional access log.And two dimensional code is only once effective
It is detailed, if the IC of brush, ID, nfc card, the head portrait face and holder's head portrait grabbed by gate inhibition's camera are done
Comparison, if do not met, judges whether it is holder kinsfolk, if it is not, alarm, is that holder blocks loss quilt to prevent
People steals brush behavior after finding.If grabbing head portrait face by camera with the entrance of interim two dimensional code and doing and put on record, and to generation
The owner of two dimensional code sends the notice that an interim two dimensional code enters gate inhibition.If entering gate inhibition by recognition of face, in addition to
Recognition of face is done, In vivo detection can be done, is the discovery that false face also will call the police.Property management personnel can periodically do gate inhibition's disengaging
The security audit of log has seen whether that incongruent personnel enter, and if necessary to inquiry disengaging log, system can be very convenient
The offer period, personnel etc. very it is detailed enter record.
Referring to FIG. 4, Fig. 4 is a kind of access control system structural representation with security audit provided by the present invention
Figure, the system include: for realizing the above method, the system
Door access machine 101, for receiving the finger print information of user's input, by finger print information and pre-stored user fingerprints number
It is compared according to the standard fingerprint information in library;If comparing successfully, channel is opened, log of the user by gate inhibition is recorded, will use
Family is sent to building's management center by the log of gate inhibition;If comparing failure, recording exceptional access log, by abnormal access log
It is sent to building's management center;
Building's management center 102, for receiving and showing that user passes through the log or abnormal access log of gate inhibition.
As it can be seen that in this system, gate inhibition open channel all can record log, the record that building's management center display is opened the door uses
Family is by the log of gate inhibition, and such log recording can help property personnel effectively to manage entire cell, when stranger enters
When, building's management center can also show abnormal access log, check management cell convenient for property personnel, prevent social idler
Come in destroy cell and corridor environment.So by effective management to gate inhibition, it is able to record all log notes for entering and leaving gate inhibition
Record is gate inhibition's log, has security audit effect, and property management personnel can very easily manage cell door by these logs
Prohibit, find the entrance cell of a suspect early, improve cell security, moreover it is possible to be provided to enter and leave the abnormal conditions of cell later
Detailed record, therefore this system is realized and obtains gate inhibition's log, checks management cell convenient for staff, improves cell safety
Property.
Based on above system, further, door access machine is also used to read the card information of user card punching, by card information and in advance
The subscriber card information database of storage is compared;If comparing successfully, channel is opened, records log of the user by gate inhibition, it will
User is sent to building's management center by the log of gate inhibition;If comparing failure, recording exceptional access log, by abnormal access day
Will is sent to building's management center.
Further, door access machine is also used to scan the interim two dimensional code that user shows, and interim two dimensional code is sent to property
Administrative center;Building's management center be also used to verify interim two dimensional code whether be owner generate two dimensional code, if so, to door access machine
It sends and opens channel instruction;If it is not, recording exceptional access log.
Further, door access machine is also used to acquire the face video of user and is uploaded to building's management center;Estate management
Center is also used to receive face video, judges whether user is to be registered for by biopsy method and face identification method
User, if so, to door access machine send open channel instruction;If it is not, recording exceptional access log.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with it is other
The difference of embodiment, same or similar part may refer to each other between each embodiment.For being disclosed in embodiment
For system, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is referring to method part
Explanation.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure
And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and
The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These
Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession
Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered
Think beyond the scope of this invention.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor
The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit
Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology
In any other form of storage medium well known in field.
Detailed Jie has been carried out to a kind of entrance guard controlling method and system with security audit provided by the present invention above
It continues.Used herein a specific example illustrates the principle and implementation of the invention, and the explanation of above embodiments is only
It is to be used to help understand method and its core concept of the invention.It should be pointed out that for those skilled in the art
For, it without departing from the principle of the present invention, can be with several improvements and modifications are made to the present invention, these improve and repair
Decorations are also fallen within the protection scope of the claims of the present invention.
Claims (8)
1. a kind of access control method with security audit characterized by comprising
Door access machine receives the finger print information of user's input, by the finger print information and pre-stored user fingerprints lane database
Standard fingerprint information is compared;
If comparing successfully, door access machine opens channel, records log of the user by gate inhibition, and user is sent by the log of gate inhibition
To building's management center;If comparing failure, abnormal access log is sent to estate management by door access machine recording exceptional access log
Center;
Building's management center receives and shows that the user passes through the log or the abnormal access log of gate inhibition.
2. the method as described in claim 1, which is characterized in that further include:
Door access machine reads the card information of user card punching, and the card information and pre-stored subscriber card information database are compared
It is right;
If comparing successfully, door access machine opens channel, records log of the user by gate inhibition, and user is sent by the log of gate inhibition
To building's management center;If comparing failure, abnormal access log is sent to estate management by door access machine recording exceptional access log
Center.
3. method according to claim 2, which is characterized in that further include:
The interim two dimensional code that door access machine scanning user shows, is sent to building's management center for interim two dimensional code;
Building's management center verifies whether the interim two dimensional code is the two dimensional code of owner's generation, if so, opening to door access machine transmission
Open channel instruction;If it is not, recording exceptional access log.
4. method as claimed in claim 3, which is characterized in that further include:
The face video of door access machine acquisition user is simultaneously uploaded to building's management center;
Building's management center receives face video, judges whether user is by biopsy method and face identification method
Registered user opens channel instruction if so, sending to door access machine;If it is not, recording exceptional access log.
5. a kind of access control system with security audit, which is characterized in that for realizing any in such as Claims 1-4
Method described in one, comprising:
Door access machine, for receiving the finger print information of user's input, by the finger print information and pre-stored user fingerprints data
Standard fingerprint information in library is compared;If comparing successfully, channel is opened, log of the user by gate inhibition is recorded, by user
Building's management center is sent to by the log of gate inhibition;If comparing failure, recording exceptional access log sends out abnormal access log
It send to building's management center;
Building's management center, for receiving and showing that the user passes through the log or the abnormal access log of gate inhibition.
6. system as claimed in claim 5, which is characterized in that door access machine is also used to read the card information of user card punching, by institute
Card information is stated to be compared with pre-stored subscriber card information database;If comparing successfully, channel is opened, record user passes through
User is sent to building's management center by the log of gate inhibition by the log of gate inhibition;If comparing failure, recording exceptional accesses day
Abnormal access log is sent to building's management center by will.
7. system as claimed in claim 6, which is characterized in that door access machine is also used to scan the interim two dimensional code that user shows,
Interim two dimensional code is sent to building's management center;Building's management center is also used to verify whether the interim two dimensional code is owner
The two dimensional code of generation opens channel instruction if so, sending to door access machine;If it is not, recording exceptional access log.
8. system as claimed in claim 7, which is characterized in that door access machine is also used to acquire the face video of user and is uploaded to
Building's management center;Building's management center is also used to receive face video, is sentenced by biopsy method and face identification method
Whether disconnected user is registered user, opens channel instruction if so, sending to door access machine;If it is not, recording exceptional accesses
Log.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910814461.5A CN110517388A (en) | 2019-08-30 | 2019-08-30 | A kind of entrance guard controlling method and system with security audit |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910814461.5A CN110517388A (en) | 2019-08-30 | 2019-08-30 | A kind of entrance guard controlling method and system with security audit |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110517388A true CN110517388A (en) | 2019-11-29 |
Family
ID=68628443
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910814461.5A Pending CN110517388A (en) | 2019-08-30 | 2019-08-30 | A kind of entrance guard controlling method and system with security audit |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110517388A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112634508A (en) * | 2020-12-31 | 2021-04-09 | 广州保利数码科技有限公司 | Access control system applied to property management |
CN114973482A (en) * | 2022-05-25 | 2022-08-30 | 深圳市启鹏天辰科技有限公司 | Gate passing method and system adopting intelligent access control machine |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN204557606U (en) * | 2015-03-24 | 2015-08-12 | 唐志良 | The gate control system of identity and video information when user uses can be recorded |
CN106296936A (en) * | 2016-08-25 | 2017-01-04 | 成都海蜃网络科技有限公司 | Community management system based on cloud platform |
CN107393087A (en) * | 2017-07-27 | 2017-11-24 | 安徽云帮邦网络技术有限公司 | A kind of gate control system based on network technology |
CN107426499A (en) * | 2017-08-05 | 2017-12-01 | 重庆智之屋科技发展有限公司 | Unattended gate inhibition's guest system and access control method |
CN107909689A (en) * | 2017-11-16 | 2018-04-13 | 长沙瑞晓知识产权服务有限公司 | Access control system based on cloud computing framework |
US10282788B1 (en) * | 2014-10-07 | 2019-05-07 | State Farm Mutual Automobile Insurance Company | Systems and methods for managing service log information |
-
2019
- 2019-08-30 CN CN201910814461.5A patent/CN110517388A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10282788B1 (en) * | 2014-10-07 | 2019-05-07 | State Farm Mutual Automobile Insurance Company | Systems and methods for managing service log information |
CN204557606U (en) * | 2015-03-24 | 2015-08-12 | 唐志良 | The gate control system of identity and video information when user uses can be recorded |
CN106296936A (en) * | 2016-08-25 | 2017-01-04 | 成都海蜃网络科技有限公司 | Community management system based on cloud platform |
CN107393087A (en) * | 2017-07-27 | 2017-11-24 | 安徽云帮邦网络技术有限公司 | A kind of gate control system based on network technology |
CN107426499A (en) * | 2017-08-05 | 2017-12-01 | 重庆智之屋科技发展有限公司 | Unattended gate inhibition's guest system and access control method |
CN107909689A (en) * | 2017-11-16 | 2018-04-13 | 长沙瑞晓知识产权服务有限公司 | Access control system based on cloud computing framework |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112634508A (en) * | 2020-12-31 | 2021-04-09 | 广州保利数码科技有限公司 | Access control system applied to property management |
CN114973482A (en) * | 2022-05-25 | 2022-08-30 | 深圳市启鹏天辰科技有限公司 | Gate passing method and system adopting intelligent access control machine |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109272613B (en) | Sensor and video linked Internet of things safety electronic access control system | |
US11236525B2 (en) | Door locking device and a smart door apparatus | |
CN205050228U (en) | National treasury access control system of bank based on iris discernment | |
CN101763672A (en) | Centralized management system for fingerprint access control system | |
WO2010005215A2 (en) | Method and system for entry and exit management using biometrics | |
US20140196636A1 (en) | Safe weapon container for securely releasing a defense weapon | |
CN106097508B (en) | A kind of access control system and method based on certificate or certificate two dimensional code | |
JP2007241501A (en) | Visitor specification system and method | |
CN110517388A (en) | A kind of entrance guard controlling method and system with security audit | |
CN105389871A (en) | Access control system | |
CN110570550A (en) | unmanned hotel management authentication method and device | |
CN116778621A (en) | Access control management method and device for large-scale power production | |
CN218848821U (en) | Prevent lock networking system of renting | |
CN1492375A (en) | Method for using finger print identification technology in bank teller management | |
CN206849125U (en) | Intelligent access control system | |
CN109903427A (en) | A kind of security system | |
JP2004265158A (en) | Security management system and security management method | |
US20200402338A1 (en) | Edge computing-based theft mitigation system | |
JP5106244B2 (en) | Entrance / exit management system | |
JP5010305B2 (en) | Unauthorized transaction prevention system with counterfeit card, facility terminal monitoring server, ATM monitoring server, ATM monitoring method, program | |
Jaiganesh et al. | Anti Theft Control of Automatic Teller Machine Using Wireless Sensors | |
KR101011211B1 (en) | Access control system and method | |
CN115830754B (en) | Security access control system and access control method | |
CN101751727A (en) | Method and device for monitoring installation of card stealing device as well as self-service terminal | |
JP2002298262A (en) | Entrance/exit control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191129 |