CN110517388A - A kind of entrance guard controlling method and system with security audit - Google Patents

A kind of entrance guard controlling method and system with security audit Download PDF

Info

Publication number
CN110517388A
CN110517388A CN201910814461.5A CN201910814461A CN110517388A CN 110517388 A CN110517388 A CN 110517388A CN 201910814461 A CN201910814461 A CN 201910814461A CN 110517388 A CN110517388 A CN 110517388A
Authority
CN
China
Prior art keywords
log
user
building
management center
gate inhibition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910814461.5A
Other languages
Chinese (zh)
Inventor
丁文斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qingyue Technology Co Ltd
Original Assignee
Beijing Qingyue Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qingyue Technology Co Ltd filed Critical Beijing Qingyue Technology Co Ltd
Priority to CN201910814461.5A priority Critical patent/CN110517388A/en
Publication of CN110517388A publication Critical patent/CN110517388A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/16Real estate
    • G06Q50/163Real estate management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/40Spoof detection, e.g. liveness detection
    • G06V40/45Detection of the body part being alive

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Human Computer Interaction (AREA)
  • General Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Human Resources & Organizations (AREA)
  • Electromagnetism (AREA)
  • Economics (AREA)
  • Toxicology (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Artificial Intelligence (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Lock And Its Accessories (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a kind of entrance guard controlling method and systems with security audit, and finger print information to be compared with the standard fingerprint information of pre-stored user fingerprints lane database this method comprises: door access machine receives the finger print information of user's input;If comparing successfully, door access machine opens channel, records log of the user by gate inhibition, user is sent to building's management center by the log of gate inhibition;If comparing failure, abnormal access log is sent to building's management center by door access machine recording exceptional access log;Building's management center receives and shows that user passes through the log or abnormal access log of gate inhibition.This method, which is realized, obtains gate inhibition's log, checks management cell convenient for staff, improves cell security.

Description

A kind of entrance guard controlling method and system with security audit
Technical field
The present invention relates to gate inhibition's technical fields, more particularly to a kind of access control method with security audit and are System.
Background technique
Currently, the guard for entrance gate of cell and the gate inhibition of cell gate, are substantially and are come in fact by cell access card IC, ID card It is existing, it is also more casual to do access card, and may lose, user cannot be distinguished.Some gate inhibitions identify user by fingerprint, but It is that stranger can not also be known using building manager when gate inhibition, brings many inconvenience to cell management, increases cell peace Full hidden danger cannot also track the details entered away once ging wrong, and go even with the monitoring video of camera It distinguishes, but there is no camera, the great challenge that the safety of cell receives in many cells in unit doorway.So due to Gate inhibition can not be obtained in time and enters and leaves the i.e. gate inhibition's log of information, cannot see whether that stranger enters cell, cell security It is lower,
Summary of the invention
The object of the present invention is to provide a kind of entrance guard controlling method and systems with security audit, obtain gate inhibition to realize Log checks management cell convenient for staff, improves cell security.
In order to solve the above technical problems, the present invention provides a kind of access control method with security audit, this method packet It includes:
Door access machine receives the finger print information of user's input, by the finger print information and pre-stored user fingerprints database In standard fingerprint information be compared;
If comparing successfully, door access machine opens channel, records log of the user by gate inhibition, the log that user is passed through gate inhibition It is sent to building's management center;If comparing failure, abnormal access log is sent to property by door access machine recording exceptional access log Administrative center;
Building's management center receives and shows that the user passes through the log or the abnormal access log of gate inhibition.
Preferably, the method also includes:
Door access machine reads the card information of user card punching, by the card information and pre-stored subscriber card information database into Row compares;
If comparing successfully, door access machine opens channel, records log of the user by gate inhibition, the log that user is passed through gate inhibition It is sent to building's management center;If comparing failure, abnormal access log is sent to property by door access machine recording exceptional access log Administrative center.
Preferably, the method also includes:
The interim two dimensional code that door access machine scanning user shows, is sent to building's management center for interim two dimensional code;
Building's management center verifies whether the interim two dimensional code is the two dimensional code of owner's generation, if so, sending out to door access machine Send unlatching channel instruction;If it is not, recording exceptional access log.
Preferably, the method also includes:
The face video of door access machine acquisition user is simultaneously uploaded to building's management center;
Building's management center receive face video, by biopsy method and face identification method judge user whether be Registered user opens channel instruction if so, sending to door access machine;If it is not, recording exceptional access log.
The present invention also provides a kind of access control systems with security audit, for realizing the above method, comprising:
Door access machine, for receiving the finger print information of user's input, by the finger print information and pre-stored user fingerprints The standard fingerprint information of lane database is compared;If comparing successfully, channel is opened, records log of the user by gate inhibition, it will User is sent to building's management center by the log of gate inhibition;If comparing failure, recording exceptional access log, by abnormal access day Will is sent to building's management center;
Building's management center, for receiving and showing log or the abnormal access day of the user by gate inhibition Will.
Preferably, door access machine is also used to read the card information of user card punching, by the card information and pre-stored user Card information database is compared;If comparing successfully, channel is opened, log of the user by gate inhibition is recorded, user is passed through into door The log of taboo is sent to building's management center;If comparing failure, abnormal access log is sent to object by recording exceptional access log Industry administrative center.
Preferably, door access machine is also used to scan the interim two dimensional code that user shows, and interim two dimensional code is sent to property pipe Reason center;Building's management center be also used to verify the interim two dimensional code whether be owner generate two dimensional code, if so, to gate inhibition Machine, which is sent, opens channel instruction;If it is not, recording exceptional access log.
Preferably, door access machine is also used to acquire the face video of user and is uploaded to building's management center;In estate management The heart is also used to receive face video, judges whether user is registered by biopsy method and face identification method User opens channel instruction if so, sending to door access machine;If it is not, recording exceptional access log.
A kind of entrance guard controlling method and system with security audit provided by the present invention, door access machine receive user's input Finger print information, the finger print information is compared with the standard fingerprint information of pre-stored user fingerprints lane database; If comparing successfully, door access machine opens channel, records log of the user by gate inhibition, user is sent to object by the log of gate inhibition Industry administrative center;If comparing failure, abnormal access log is sent in estate management by door access machine recording exceptional access log The heart;Building's management center receives and shows that the user passes through the log or the abnormal access log of gate inhibition.As it can be seen that gate inhibition Open channel all can record log, building's management center display open the door record be log of the user by gate inhibition, such log Record can help property personnel effectively to manage entire cell, and when stranger enters, building's management center can also show different Normal access log checks management cell convenient for property personnel, prevents social idler from coming in destroy cell and corridor environment.Such as This is able to record all i.e. gate inhibition's logs of log recording for entering and leaving gate inhibition, has security audit by effective management to gate inhibition Effect, property management personnel can very easily manage cell gate inhibition by these logs, find the entrance of a suspect early Cell improves cell security, moreover it is possible to provide detailed record to enter and leave the abnormal conditions of cell later, therefore the present invention realizes Gate inhibition's log is obtained, management cell is checked convenient for staff, improves cell security.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow chart of the access control method with security audit provided by the present invention;
Fig. 2 is the flow chart that property registers access information;
Fig. 3 is access control flow chart;
Fig. 4 is a kind of access control system structural schematic diagram with security audit provided by the present invention.
Specific embodiment
Core of the invention is to provide a kind of entrance guard controlling method and system with security audit, obtains gate inhibition to realize Log checks management cell convenient for staff, improves cell security.
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
Referring to FIG. 1, Fig. 1 is a kind of flow chart of the access control method with security audit provided by the present invention, Method includes the following steps:
S11: door access machine receives the finger print information of user's input, by finger print information and pre-stored user fingerprints database In standard fingerprint information be compared;
S12: if comparing successfully, door access machine opens channel, records log of the user by gate inhibition, and user is passed through gate inhibition's Log is sent to building's management center;If comparing failure, abnormal access log is sent to by door access machine recording exceptional access log Building's management center;
S13: building's management center receives and shows that user passes through the log or abnormal access log of gate inhibition.
As it can be seen that in this method gate inhibition open channel all can record log, building's management center display open the door record i.e. use Family is by the log of gate inhibition, and such log recording can help property personnel effectively to manage entire cell, when stranger enters When, building's management center can also show abnormal access log, check management cell convenient for property personnel, prevent social idler Come in destroy cell and corridor environment.So by effective management to gate inhibition, it is able to record all log notes for entering and leaving gate inhibition Record is gate inhibition's log, has security audit effect, and property management personnel can very easily manage cell door by these logs Prohibit, find the entrance cell of a suspect early, improve cell security, moreover it is possible to be provided to enter and leave the abnormal conditions of cell later Detailed record, therefore this method is realized and obtains gate inhibition's log, checks management cell convenient for staff, improves cell safety Property.
It is further, further comprising the steps of based on the above method:
S21: door access machine reads the card information of user card punching, by card information and pre-stored subscriber card information database into Row compares;
S22: if comparing successfully, door access machine opens channel, records log of the user by gate inhibition, and user is passed through gate inhibition's Log is sent to building's management center;If comparing failure, abnormal access log is sent to by door access machine recording exceptional access log Building's management center.
Further, the method also includes following steps:
S31: interim two dimensional code is sent to building's management center by the interim two dimensional code that door access machine scanning user shows;
S32: building's management center verifies whether interim two dimensional code is the two dimensional code of owner's generation, if so, sending out to door access machine Send unlatching channel instruction;If it is not, recording exceptional access log.
Further, the method also includes following steps:
S41: the face video of door access machine acquisition user is simultaneously uploaded to building's management center;
S42: building's management center receives face video, judges that user is by biopsy method and face identification method It is no for registered user, open channel instruction if so, sending to door access machine;If it is not, recording exceptional access log.
Further, the method also includes: door access machines to receive the door open command and user account that cell phone application is sent, door User information is sent to building's management center by taboo machine;Building's management center judges whether user account is registered account, If so, gate inhibition is opened, if it is not, recording exceptional access log.Wherein, after opening gate inhibition further include: record user passes through gate inhibition Log.
By above method, fingerprint recognition, recognition of face, IC, ID card, interim two dimension can be using gate inhibition's unlocking mode Code, a variety of unlocking modes of small routine remote unlocking all, unlock each time, all can in Property Management System it is detailed record who When by what means gate inhibition has been opened, security audit log detailed in this way can help property effectively to manage entirely Cell prevents social idler from coming in destroy cell and corridor environment.It, can if encountering the dangerous unlocking of doubtful attack Monitoring alarm also can easily search reason in the later period.
By effective management to gate inhibition, it is able to record all detailed records for entering and leaving gate inhibition, entering and leaving gate inhibition every time has Detailed security audit log, property management personnel can very easily manage cell gate inhibition by these security audit logs, The entrance cell for finding a suspect early, into corridor.It prevents society people without fixed duties etc. from swindling into corridor, pastes small advertisement Equal various actions.And the multifarious method prohibited of opening the door, cell owner can greatly be facilitated to pass in and out cell, prevented without door The problem of prohibiting card and cannot be introduced into cell.In short, the implementation of this set system, the not only easy access of convenient cell owner, but also Property management personnel is helped preferably to guarantee the safety of cell, neatly, moreover it is possible to provide in detail to enter and leave the abnormal conditions of cell later Thin record.
This method is realized that the installation of access control system needs on cell doorway, cell gate doorway by access control system Door access machine is installed, gate is connected.And these door access machines are connected to Property Management System i.e. building's management center by cell Intranet. Building's management center has the function of managing gate inhibition, issues owner's register information, identifies face and In vivo detection ability, and remember The information i.e. user of the detailed disengaging gate inhibition in family is employed by the log of gate inhibition, the connection of these systems is adjusted after leading to, so that it may after Continuous real work.Wherein, log includes: time, Men Jinming, application method, user, if same to register information, if family People uses, stranger's face record.
Please referring to 2, Fig. 2 is the flow chart that property registers access information, and owner needs the user of property registration gate inhibition Method, owner can choose to be unlocked using some of them method, can also all be registered.Wherein, using face and fingerprint, in property Carry out the acquisition of face and fingerprint;Using NFC, IC, ID card can register detailed information in property, record actual holder, And register face information;Using wechat small routine, the account information of detailed property system is registered in property, account passes through object After industry authorization, the face information of owner and household can also be submitted by small routine.After the completion of all information registrations, object Information can be issued in cell gate inhibition and the gate inhibition of unit mouth by industry system.Owner can use the guard method of registration to pass in and out Gate inhibition.
Referring to FIG. 3, Fig. 3 is access control flow chart, owner user by registration can use each method into Gate inhibition out.Wherein, if using IC, ID, NFC swipes the card, and the camera on door access machine can grab out the head portrait for the people that swipes the card, and passes to In property intranet server, by face identification method judgement swipe the card whether be registration user, if it is directly passing through and Record the practical log by gate inhibition.If it is not, the household for judging whether it is owner uses, if it is directly passing through and remember Pass through the log of gate inhibition under record.Both the above situation is not then to be recorded as abnormal conditions, and send one to relevant owner Item alarm, and owner is asked to confirm whether use is normal.
If the case where whether fingerprint is registration directly compared, passes through door if it is directly passing through and recording using fingerprint The log of taboo.If it is not, recording exceptional access log.
If door access machine grabs face video using face, passes in midnight intranet server, pass through In vivo detection and people Face identification, judges whether it is registered user, if it is directly passing through and record the log by gate inhibition.If no It is recording exceptional access log.
Using wechat small routine, the order opened the door and prohibited is sent by wechat small routine, by cloud transfer, judges to send life Whether the account of order is registered account, if it is directly passing through and record the log by gate inhibition.If it is not, recording different Normal access log.
If the interim two dimensional code that owner generates is passed on server and is tested by after door access machine barcode scanning using interim two dimensional code Whether card is that the two dimensional code that owner generates sends a confirmation message to the owner of generation and inform owner if it is directly passing through And the log that record passes through gate inhibition.If it is not, recording exceptional access log.And two dimensional code is only once effective
It is detailed, if the IC of brush, ID, nfc card, the head portrait face and holder's head portrait grabbed by gate inhibition's camera are done Comparison, if do not met, judges whether it is holder kinsfolk, if it is not, alarm, is that holder blocks loss quilt to prevent People steals brush behavior after finding.If grabbing head portrait face by camera with the entrance of interim two dimensional code and doing and put on record, and to generation The owner of two dimensional code sends the notice that an interim two dimensional code enters gate inhibition.If entering gate inhibition by recognition of face, in addition to Recognition of face is done, In vivo detection can be done, is the discovery that false face also will call the police.Property management personnel can periodically do gate inhibition's disengaging The security audit of log has seen whether that incongruent personnel enter, and if necessary to inquiry disengaging log, system can be very convenient The offer period, personnel etc. very it is detailed enter record.
Referring to FIG. 4, Fig. 4 is a kind of access control system structural representation with security audit provided by the present invention Figure, the system include: for realizing the above method, the system
Door access machine 101, for receiving the finger print information of user's input, by finger print information and pre-stored user fingerprints number It is compared according to the standard fingerprint information in library;If comparing successfully, channel is opened, log of the user by gate inhibition is recorded, will use Family is sent to building's management center by the log of gate inhibition;If comparing failure, recording exceptional access log, by abnormal access log It is sent to building's management center;
Building's management center 102, for receiving and showing that user passes through the log or abnormal access log of gate inhibition.
As it can be seen that in this system, gate inhibition open channel all can record log, the record that building's management center display is opened the door uses Family is by the log of gate inhibition, and such log recording can help property personnel effectively to manage entire cell, when stranger enters When, building's management center can also show abnormal access log, check management cell convenient for property personnel, prevent social idler Come in destroy cell and corridor environment.So by effective management to gate inhibition, it is able to record all log notes for entering and leaving gate inhibition Record is gate inhibition's log, has security audit effect, and property management personnel can very easily manage cell door by these logs Prohibit, find the entrance cell of a suspect early, improve cell security, moreover it is possible to be provided to enter and leave the abnormal conditions of cell later Detailed record, therefore this system is realized and obtains gate inhibition's log, checks management cell convenient for staff, improves cell safety Property.
Based on above system, further, door access machine is also used to read the card information of user card punching, by card information and in advance The subscriber card information database of storage is compared;If comparing successfully, channel is opened, records log of the user by gate inhibition, it will User is sent to building's management center by the log of gate inhibition;If comparing failure, recording exceptional access log, by abnormal access day Will is sent to building's management center.
Further, door access machine is also used to scan the interim two dimensional code that user shows, and interim two dimensional code is sent to property Administrative center;Building's management center be also used to verify interim two dimensional code whether be owner generate two dimensional code, if so, to door access machine It sends and opens channel instruction;If it is not, recording exceptional access log.
Further, door access machine is also used to acquire the face video of user and is uploaded to building's management center;Estate management Center is also used to receive face video, judges whether user is to be registered for by biopsy method and face identification method User, if so, to door access machine send open channel instruction;If it is not, recording exceptional access log.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with it is other The difference of embodiment, same or similar part may refer to each other between each embodiment.For being disclosed in embodiment For system, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is referring to method part Explanation.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered Think beyond the scope of this invention.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology In any other form of storage medium well known in field.
Detailed Jie has been carried out to a kind of entrance guard controlling method and system with security audit provided by the present invention above It continues.Used herein a specific example illustrates the principle and implementation of the invention, and the explanation of above embodiments is only It is to be used to help understand method and its core concept of the invention.It should be pointed out that for those skilled in the art For, it without departing from the principle of the present invention, can be with several improvements and modifications are made to the present invention, these improve and repair Decorations are also fallen within the protection scope of the claims of the present invention.

Claims (8)

1. a kind of access control method with security audit characterized by comprising
Door access machine receives the finger print information of user's input, by the finger print information and pre-stored user fingerprints lane database Standard fingerprint information is compared;
If comparing successfully, door access machine opens channel, records log of the user by gate inhibition, and user is sent by the log of gate inhibition To building's management center;If comparing failure, abnormal access log is sent to estate management by door access machine recording exceptional access log Center;
Building's management center receives and shows that the user passes through the log or the abnormal access log of gate inhibition.
2. the method as described in claim 1, which is characterized in that further include:
Door access machine reads the card information of user card punching, and the card information and pre-stored subscriber card information database are compared It is right;
If comparing successfully, door access machine opens channel, records log of the user by gate inhibition, and user is sent by the log of gate inhibition To building's management center;If comparing failure, abnormal access log is sent to estate management by door access machine recording exceptional access log Center.
3. method according to claim 2, which is characterized in that further include:
The interim two dimensional code that door access machine scanning user shows, is sent to building's management center for interim two dimensional code;
Building's management center verifies whether the interim two dimensional code is the two dimensional code of owner's generation, if so, opening to door access machine transmission Open channel instruction;If it is not, recording exceptional access log.
4. method as claimed in claim 3, which is characterized in that further include:
The face video of door access machine acquisition user is simultaneously uploaded to building's management center;
Building's management center receives face video, judges whether user is by biopsy method and face identification method Registered user opens channel instruction if so, sending to door access machine;If it is not, recording exceptional access log.
5. a kind of access control system with security audit, which is characterized in that for realizing any in such as Claims 1-4 Method described in one, comprising:
Door access machine, for receiving the finger print information of user's input, by the finger print information and pre-stored user fingerprints data Standard fingerprint information in library is compared;If comparing successfully, channel is opened, log of the user by gate inhibition is recorded, by user Building's management center is sent to by the log of gate inhibition;If comparing failure, recording exceptional access log sends out abnormal access log It send to building's management center;
Building's management center, for receiving and showing that the user passes through the log or the abnormal access log of gate inhibition.
6. system as claimed in claim 5, which is characterized in that door access machine is also used to read the card information of user card punching, by institute Card information is stated to be compared with pre-stored subscriber card information database;If comparing successfully, channel is opened, record user passes through User is sent to building's management center by the log of gate inhibition by the log of gate inhibition;If comparing failure, recording exceptional accesses day Abnormal access log is sent to building's management center by will.
7. system as claimed in claim 6, which is characterized in that door access machine is also used to scan the interim two dimensional code that user shows, Interim two dimensional code is sent to building's management center;Building's management center is also used to verify whether the interim two dimensional code is owner The two dimensional code of generation opens channel instruction if so, sending to door access machine;If it is not, recording exceptional access log.
8. system as claimed in claim 7, which is characterized in that door access machine is also used to acquire the face video of user and is uploaded to Building's management center;Building's management center is also used to receive face video, is sentenced by biopsy method and face identification method Whether disconnected user is registered user, opens channel instruction if so, sending to door access machine;If it is not, recording exceptional accesses Log.
CN201910814461.5A 2019-08-30 2019-08-30 A kind of entrance guard controlling method and system with security audit Pending CN110517388A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910814461.5A CN110517388A (en) 2019-08-30 2019-08-30 A kind of entrance guard controlling method and system with security audit

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910814461.5A CN110517388A (en) 2019-08-30 2019-08-30 A kind of entrance guard controlling method and system with security audit

Publications (1)

Publication Number Publication Date
CN110517388A true CN110517388A (en) 2019-11-29

Family

ID=68628443

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910814461.5A Pending CN110517388A (en) 2019-08-30 2019-08-30 A kind of entrance guard controlling method and system with security audit

Country Status (1)

Country Link
CN (1) CN110517388A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112634508A (en) * 2020-12-31 2021-04-09 广州保利数码科技有限公司 Access control system applied to property management
CN114973482A (en) * 2022-05-25 2022-08-30 深圳市启鹏天辰科技有限公司 Gate passing method and system adopting intelligent access control machine

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN204557606U (en) * 2015-03-24 2015-08-12 唐志良 The gate control system of identity and video information when user uses can be recorded
CN106296936A (en) * 2016-08-25 2017-01-04 成都海蜃网络科技有限公司 Community management system based on cloud platform
CN107393087A (en) * 2017-07-27 2017-11-24 安徽云帮邦网络技术有限公司 A kind of gate control system based on network technology
CN107426499A (en) * 2017-08-05 2017-12-01 重庆智之屋科技发展有限公司 Unattended gate inhibition's guest system and access control method
CN107909689A (en) * 2017-11-16 2018-04-13 长沙瑞晓知识产权服务有限公司 Access control system based on cloud computing framework
US10282788B1 (en) * 2014-10-07 2019-05-07 State Farm Mutual Automobile Insurance Company Systems and methods for managing service log information

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10282788B1 (en) * 2014-10-07 2019-05-07 State Farm Mutual Automobile Insurance Company Systems and methods for managing service log information
CN204557606U (en) * 2015-03-24 2015-08-12 唐志良 The gate control system of identity and video information when user uses can be recorded
CN106296936A (en) * 2016-08-25 2017-01-04 成都海蜃网络科技有限公司 Community management system based on cloud platform
CN107393087A (en) * 2017-07-27 2017-11-24 安徽云帮邦网络技术有限公司 A kind of gate control system based on network technology
CN107426499A (en) * 2017-08-05 2017-12-01 重庆智之屋科技发展有限公司 Unattended gate inhibition's guest system and access control method
CN107909689A (en) * 2017-11-16 2018-04-13 长沙瑞晓知识产权服务有限公司 Access control system based on cloud computing framework

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112634508A (en) * 2020-12-31 2021-04-09 广州保利数码科技有限公司 Access control system applied to property management
CN114973482A (en) * 2022-05-25 2022-08-30 深圳市启鹏天辰科技有限公司 Gate passing method and system adopting intelligent access control machine

Similar Documents

Publication Publication Date Title
CN109272613B (en) Sensor and video linked Internet of things safety electronic access control system
US11236525B2 (en) Door locking device and a smart door apparatus
CN205050228U (en) National treasury access control system of bank based on iris discernment
CN101763672A (en) Centralized management system for fingerprint access control system
WO2010005215A2 (en) Method and system for entry and exit management using biometrics
US20140196636A1 (en) Safe weapon container for securely releasing a defense weapon
CN106097508B (en) A kind of access control system and method based on certificate or certificate two dimensional code
JP2007241501A (en) Visitor specification system and method
CN110517388A (en) A kind of entrance guard controlling method and system with security audit
CN105389871A (en) Access control system
CN110570550A (en) unmanned hotel management authentication method and device
CN116778621A (en) Access control management method and device for large-scale power production
CN218848821U (en) Prevent lock networking system of renting
CN1492375A (en) Method for using finger print identification technology in bank teller management
CN206849125U (en) Intelligent access control system
CN109903427A (en) A kind of security system
JP2004265158A (en) Security management system and security management method
US20200402338A1 (en) Edge computing-based theft mitigation system
JP5106244B2 (en) Entrance / exit management system
JP5010305B2 (en) Unauthorized transaction prevention system with counterfeit card, facility terminal monitoring server, ATM monitoring server, ATM monitoring method, program
Jaiganesh et al. Anti Theft Control of Automatic Teller Machine Using Wireless Sensors
KR101011211B1 (en) Access control system and method
CN115830754B (en) Security access control system and access control method
CN101751727A (en) Method and device for monitoring installation of card stealing device as well as self-service terminal
JP2002298262A (en) Entrance/exit control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191129