CN110738769A - forbidden user identification method, device, system and computer equipment - Google Patents

forbidden user identification method, device, system and computer equipment Download PDF

Info

Publication number
CN110738769A
CN110738769A CN201910887841.1A CN201910887841A CN110738769A CN 110738769 A CN110738769 A CN 110738769A CN 201910887841 A CN201910887841 A CN 201910887841A CN 110738769 A CN110738769 A CN 110738769A
Authority
CN
China
Prior art keywords
gate inhibition
preset
user
identification information
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910887841.1A
Other languages
Chinese (zh)
Inventor
潘海华
谢家应
封琰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hitachi Building Technology Guangzhou Co Ltd
Original Assignee
Hitachi Building Technology Guangzhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hitachi Building Technology Guangzhou Co Ltd filed Critical Hitachi Building Technology Guangzhou Co Ltd
Priority to CN201910887841.1A priority Critical patent/CN110738769A/en
Publication of CN110738769A publication Critical patent/CN110738769A/en
Pending legal-status Critical Current

Links

Images

Abstract

The application relates to a identity recognition method, a device, a system, computer equipment and a storage medium for a forbidden user, wherein the method comprises the steps of receiving equipment identification information sent by detection equipment, embedding the detection equipment in a forbidden machine, detecting that intelligent wearable equipment is arranged in a set range near the forbidden machine, reading the equipment identification information carried by the intelligent wearable equipment, receiving user face information sent by face recognition equipment, obtaining the user face information in the set range near the forbidden machine by the face recognition equipment according to the equipment identification information sent by the detection equipment, obtaining preset user face information corresponding to the equipment identification information, and confirming that the user identity recognition in the set range near the forbidden machine passes if the user face information is successfully matched with the preset user face information.

Description

forbidden user identification method, device, system and computer equipment
Technical Field
The present application relates to the field of identity recognition technologies, and in particular, to an method, an apparatus, a system, a computer device, and a storage medium for recognizing identities of prohibited users.
Background
With the development of society, the security of buildings is more and more emphasized by people, and forbidden systems are arranged at the entrances and exits of most buildings so as to identify the identities of users who enter and exit the buildings, thereby ensuring the security of the buildings.
In the conventional user identification mode, generally matches the received contact IC card information of the user with pre-stored IC card information, and if the matching is successful, the user identification is confirmed to pass.
Disclosure of Invention
In view of the above, there is a need to provide methods, apparatuses, systems, computer devices and storage media for disabled users.
A method of disabling the identification of a user, the method comprising:
the detection equipment is embedded in an gate inhibition machine and used for detecting that intelligent wearable equipment is arranged in a set range near the gate inhibition machine and reading the equipment identification information carried by the intelligent wearable equipment;
the face recognition equipment is used for acquiring user face information within a set range near the gate inhibition machine according to the equipment identification information sent by the detection equipment;
acquiring preset user face information corresponding to the equipment identification information;
and if the user face information is successfully matched with the preset user face information, determining that the user identity recognition in the set range near the gate inhibition machine is passed through by .
In embodiments, the receiving device identification information sent by the detection device includes:
receiving target equipment identification information sent by the detection equipment; the detection equipment is further used for matching the read equipment identification information carried by the intelligent wearable equipment with preset equipment identification information, and if the matching is successful, the equipment identification information is recognized as the target equipment identification information.
In embodiments, the obtaining of the preset user face information corresponding to the device identification information includes:
inquiring a preset database according to the equipment identification information; the preset database stores preset user face information corresponding to a plurality of pieces of equipment identification information;
and acquiring preset user face information corresponding to the equipment identification information from the preset database.
In embodiments, after confirming that the user identification in the set range near the gate inhibition machine passes, the method further comprises:
the method comprises the steps of obtaining a preset gate inhibition machine control instruction, and sending the preset gate inhibition machine control instruction to a gate inhibition machine controller, wherein the preset gate inhibition machine control instruction is used for triggering the gate inhibition machine controller to control the gate inhibition machine to be opened.
In embodiments, after obtaining the preset user face information corresponding to the device identification information, the method further includes:
if the matching of the user face information and the preset user face information fails, determining that the user identity recognition in the set range near the gate inhibition machine does not pass;
the method comprises the steps of obtaining a preset alarm instruction, and sending the preset alarm instruction to an gate inhibition machine controller, wherein the preset alarm instruction is used for triggering the gate inhibition machine controller to control the gate inhibition machine to execute corresponding alarm operation.
In embodiments, if the user face information sent by the face recognition device is multiple user face information, after receiving the user face information sent by the face recognition device, the method further includes:
if the plurality of user face information are successfully matched with the corresponding preset user face information, confirming that the plurality of user identity identifications in the set range near the gate inhibition machine pass;
the method comprises the steps of obtaining a preset gate inhibition machine control instruction, and sending the preset gate inhibition machine control instruction to a gate inhibition machine controller, wherein the preset gate inhibition machine control instruction is used for triggering the gate inhibition machine controller to control the gate inhibition machine to be opened;
and if at least pieces of user face information fail to be matched with all the preset user face information, acquiring a preset alarm instruction, and sending the preset alarm instruction to a gate inhibition machine controller, wherein the preset alarm instruction is used for triggering the gate inhibition machine controller to control the gate inhibition machine to execute corresponding alarm operation.
a disabled user identification device, the device comprising:
the detection equipment is embedded in an gate inhibition machine and used for detecting that intelligent wearable equipment is arranged in a set range near the gate inhibition machine and reading the equipment identification information carried by the intelligent wearable equipment;
the face recognition equipment is used for acquiring user face information within a set range near the gate inhibition machine according to the equipment identification information sent by the detection equipment;
the face information acquisition module is used for acquiring preset user face information corresponding to the equipment identification information;
and the identity recognition module is used for confirming that the identity recognition of the user in the set range near the gate inhibition machine is passed if the matching of the user face information and the preset user face information is successful.
identity recognition system of forbidden users comprises a detection device, a face recognition device and a server, wherein the server is respectively connected with the detection device and the face recognition device, the detection device is also connected with the face recognition device, the detection device is embedded in a forbidden machine, the server is also connected with an forbidden machine controller, and the forbidden machine controller is also connected with a forbidden machine;
the detection device is used for detecting that intelligent wearable devices are arranged in a set area, reading the device identification information carried by the intelligent wearable devices, and sending the device identification information to the server and the face recognition device;
the face recognition device is used for acquiring user face information in the set area according to the device identification information and sending the user face information to the server;
said server for performing the steps of said method of user identification;
the gate inhibition machine controller is used for receiving a preset gate inhibition machine control instruction sent by the server and controlling the gate inhibition machine to be opened according to the preset gate inhibition machine control instruction.
A computer device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the steps when executing the computer program:
the detection equipment is embedded in an gate inhibition machine and used for detecting that intelligent wearable equipment is arranged in a set range near the gate inhibition machine and reading the equipment identification information carried by the intelligent wearable equipment;
the face recognition equipment is used for acquiring user face information within a set range near the gate inhibition machine according to the equipment identification information sent by the detection equipment;
acquiring preset user face information corresponding to the equipment identification information;
and if the user face information is successfully matched with the preset user face information, determining that the user identity recognition in the set range near the gate inhibition machine is passed through by .
A computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of:
the detection equipment is embedded in an gate inhibition machine and used for detecting that intelligent wearable equipment is arranged in a set range near the gate inhibition machine and reading the equipment identification information carried by the intelligent wearable equipment;
the face recognition equipment is used for acquiring user face information within a set range near the gate inhibition machine according to the equipment identification information sent by the detection equipment;
acquiring preset user face information corresponding to the equipment identification information;
and if the user face information is successfully matched with the preset user face information, determining that the user identity recognition in the set range near the gate inhibition machine is passed through by .
The forbidden user identity recognition method, the device, the system, the computer equipment and the storage medium receive equipment identification information sent by detection equipment, the detection equipment is embedded in a forbidden machine and used for detecting that intelligent wearable equipment is arranged in a set range near the forbidden machine, reading the equipment identification information carried by the intelligent wearable equipment, receiving user face information sent by face recognition equipment, the face recognition equipment is used for obtaining the user face information in the set range near the forbidden machine according to the equipment identification information sent by the detection equipment, obtaining preset user face information corresponding to the equipment identification information, confirming that the user identity recognition in the set range near the forbidden machine passes if the user face information is successfully matched with the preset user face information, achieving identity verification of fixed distance and 0 contact, avoiding double verification of equipment and face information from entering suspicious personnel, avoiding the problems of information loss, cracking and single identity , and greatly improving the safety of identity recognition.
Drawings
FIG. 1 is a diagram of an application scenario of the user-disabled identification method in embodiments;
FIG. 2 is a flow chart illustrating a method for identifying the identity of a disabled user in embodiments;
FIG. 3 is a schematic flow chart showing the steps of user disable identification in embodiments;
FIG. 4 is a schematic flow chart showing the steps of user disable identification in embodiments;
FIG. 5 is a block diagram of an identification device of disabled users in embodiments;
fig. 6 is an internal structural view of a computer device in embodiments.
Detailed Description
For purposes of making the present application, its objects, aspects and advantages more apparent, the present application is described in further detail with reference to the drawings and the examples.
The forbidden user identity recognition method can be applied to an application environment shown in fig. 1, the application environment comprises a detection device 101, a face recognition device 102 and a server 103, the server 103 is respectively connected with the detection device 101, the face recognition device 102 and a forbidden machine controller 104 through a network, the detection device 101 is also connected with the face recognition device 102 through the network, and the detection device 101 is embedded in a forbidden machine, wherein the detection device 101 is used for acquiring device identification information carried by intelligent wearable devices in a set range near the forbidden machine in real time, the face recognition device 102 is used for acquiring user face information in the set range near the forbidden machine, the forbidden machine controller 104 is used for receiving instructions and controlling forbidden machine states, the server 103 is respectively connected with the face recognition device 102, the detection device 101 and the forbidden machine controller 104, the user face information and the device identification information can be acquired through the network, and the forbidden machine control can be controlled by sending preset forbidden machine control instructions.
In the specific implementation, as shown in fig. 1, after receiving the device identification information sent by the detection device 101 and the user face information sent by the face recognition device 102, the server 103 extracts the face information corresponding to the device identification information in the database and matches the obtained user face information, if the matching is successful, it is determined that the user identification in the set range near the gate inhibition machine passes, and sends an instruction to the gate inhibition machine controller 104 to trigger gate inhibition machine controller 104 to control the gate inhibition machine to be turned on, if the matching is failed, it is determined that the user identification in the set range near the gate inhibition machine does not pass, and sends preset warning information to the gate inhibition machine controller 104 to remind security personnel, of course, other control operations can be performed according to actual conditions, wherein the face recognition device 102 is a device capable of acquiring a face image and sending data to the server 103, may be a camera device having a camera shooting function and returning data, or may be a wearable device or a server that includes a computer system for image acquisition and image processing, the intelligent detection device 101 and the intelligent server may be a more intelligent devices, and may not be a specific application server.
It should be noted that, the application scenario of the identity recognition method for forbidden users may be a scenario in which the method enters a certain area, or a scenario in which the method leaves a certain area, and all the scenarios in which the identity recognition method for forbidden users can be applied are the application scenarios of the present invention.
In embodiments, as shown in fig. 2, user forbidden identification methods are provided, which are described by taking the application of the method to the server in fig. 1 as an example, and include the following steps:
and S201, receiving equipment identification information sent by detection equipment, wherein the detection equipment is embedded in an gate inhibition machine and is used for detecting that intelligent wearable equipment exists in a set range near the gate inhibition machine and reading the equipment identification information carried by the intelligent wearable equipment.
The intelligent wearable device detection method comprises the steps that device identification information is main information for identifying intelligent wearable devices, each intelligent wearable device corresponds to -only device identification information, the device identification information corresponds to preset user face information, corresponding user face information can be found according to the device identification information, meanwhile, corresponding user identification information and corresponding intelligent wearable device information can also be found according to the user face information, detection devices are embedded in a gate inhibition machine and used for carrying out continuous real-time detection on the intelligent wearable devices in a set range (for example, the range is 5 meters near the gate inhibition machine) near the gate inhibition machine, the detection range can be adjusted according to actual conditions, the adjustment of the range size is achieved by adjusting the signal intensity of the detection devices, the larger the intensity is, the more the detection range is, the distance from the intelligent wearable devices to gate inhibition machine is long, and the intelligent wearable devices can be detected within the intensity range of the detection devices.
In the specific implementation, after the detection device detects the device identification information carried by the intelligent wearable device, the detection device searches in a preset device identification library to find the device identification information corresponding to the detected intelligent wearable device. The method comprises the steps of preliminarily matching equipment identification information with preset equipment identification information, sending the equipment identification information to a server and face recognition equipment at the same time after matching is successful, waiting for user face information of the face recognition equipment after the server receives the equipment identification information, and immediately carrying out face recognition on a user after the face recognition equipment receives the identification information. Particularly, if the detected device identification information does not belong to the preset device identification information, the device identification information is only sent to the face recognition device, and the device identification information does not need to be sent to the server at the same time. In addition, after receiving the device identification information, the server searches corresponding preset user face information in the data in advance.
It should be noted that the communication data (such as the sending device identification information) may be sent or received through a local area network, a wireless network based on a mobile phone operator, or other various transmission systems.
And S202, receiving the user face information sent by the face recognition equipment, wherein the face recognition equipment is used for acquiring the user face information in the set range near the gate inhibition machine according to the equipment identification information sent by the detection equipment.
The method comprises the steps of acquiring an image or a video stream containing a human face by using a camera or a camera, automatically detecting and tracking the human face in the image, and further performing face recognition on the detected human face, wherein the face recognition is series related technologies, the face recognition equipment is equipment which carries the face recognition technology and can use the face recognition technology to recognize the facial features of the user so as to extract key information, the face recognition equipment comprises various camera equipment and computer equipment which processes the acquired image, for example, the camera equipment shoots a picture of the face of the user and then transmits the picture to the computer equipment for processing, so that a set of system for extracting the facial features and a set of face recognition equipment are also understood.
In particular, under the condition that the equipment identification information detected by the detection equipment does not belong to preset equipment identification information, the face recognition equipment also carries out dynamic real-time face recognition on the user and sends the collected user face information to the server.
It should be noted that the communication data (for example, sending the user face identification information) may be sent or received through a local area network, a wireless network based on a mobile phone operator, or other transmission systems in various forms. Therefore, the face recognition equipment can be arranged at any distance within the transmission distance of the communication data according to the requirement, so that the remote face recognition is realized.
Step S203, obtaining preset user face information corresponding to the device identification information.
In this step, the preset user face information refers to user face information that is stored in the database in advance and can be used for matching and recognition, and all the user information that can be determined can be the preset user face information. The preset user face information is related to the equipment identification information or related to other identification information of the user, and the personal identity information identification of the user can be obtained by identifying the user face information. The collection of the face information of the preset user can be realized by importing data from the outside in advance, or the face information of the user can be updated after the user passes the matching every time; for example, in an office building, the face information of a user allowed to enter the office building is collected by building staff and stored in a database; or the regularly updated user face information when the user is confirmed by identity recognition matching.
In a specific implementation, after searching preset user face information corresponding to corresponding device identification information from a database according to the device identification information, a server waits for comparison with received user face information, where the preset user face information may be multiple preset user face information under user identification information, and the multiple preset user face information may be subjected to a matching step.
Step S204, if the matching of the user face information and the preset user face information is successful, confirming that the user identity identification in the set range near the gate inhibition machine is passed.
In this step, the successful matching is determined by extracting the facial features in the user face information, and calculating the matching degree with the facial features of the preset user face information, and if the matching degree is higher than a set threshold value, the matching is successful. If the face feature matching degree is lower than the threshold value, the face feature matching degree calculation results of other preset user face information under the user identification are all lower than the set threshold value, and the matching is judged to be failed.
In the specific implementation, after receiving the face information of the user, the server compares and matches the face information of the user with preset face information of the user acquired from a database, extracts face characteristic information in the face information of the user, calculates the matching degree with the face characteristic information of the preset face information of the user, modifies the identity recognition state of the user to be a pass state if the matching is successful, generates an gate inhibition opening instruction and sends a gate inhibition opening instruction to a gate inhibition controller, generates warning information carrying the user identification information if the matching is failed, sends the warning information to a gate inhibition controller, and reminds external personnel to pay attention, and meanwhile, stores information used in the matching, including the face information of the user, time information and the like, in corresponding positions of the database.
According to the identity recognition method of the forbidden user, the equipment identification information sent by the detection equipment is received, the user face information sent by the face recognition equipment is received, the preset user face information corresponding to the equipment identification information is obtained, the user identity information in the set range near the forbidden machine is further judged, the identity recognition system forbidden through can be used without sensing verification on a specified device by a user carrying an IC card or any operation, the safety of identity recognition is improved through double verification of the intelligent wearing equipment and the face information in the step, the intelligent equipment needs to be matched with the face recognition, the risk that the traditional IC card is easy to crack, lose and share by multiple people is eliminated, meanwhile, the passing efficiency forbidden by can be improved through the remote detection of the detection equipment and the face recognition equipment, and therefore the passing time cost of personnel is reduced.
In embodiments, in step S201, the target device identification information sent by the detection device is received, and the detection device is further configured to match the read device identification information carried by the intelligent wearable device with preset device identification information, and if the matching is successful, identify the device identification information as the target device identification information.
In the embodiment, the target device identification information is the device identification information which is obtained by the detection device and successfully confirmed after matching with the preset device identification information, the preset identification information is the device identification information which is stored in the database in advance and can be used for matching, all the information capable of determining the user device information can be the preset device identification information, the preset device identification information is related to the user information or other identification information of the user and comprises user face information, the user personal identification information identification can be obtained by identifying the user device identification information, the collection of the preset device identification information can be conducted by data import from the outside in advance, for example, in an office building, workers of the building distribute the device identification information to users of the office building in advance and respectively write the device identification information into the intelligent wearable devices of the users correspondingly, and the preset device identification information is corresponding to the unique of the user personal identification information.
The method is characterized by comprising the steps of detecting whether intelligent wearable equipment enters a set detection range by detection equipment, acquiring equipment identification information of the intelligent wearable equipment by the detection equipment, extracting preset equipment information, matching and comparing the preset equipment information with the acquired equipment identification information of the intelligent wearable equipment, identifying the equipment identification information as target equipment identification information if matching is successful, and sending the target identification information to face recognition equipment and a server, wherein particularly, if matching fails, only the equipment identification information is sent to the face recognition equipment.
In another embodiments, in step S201, receiving device identification information sent by the detection device, further including receiving target device identification information sent by the detection device, where the detection device is further configured to match the read device identification information carried by the intelligent wearable device with preset device identification information, and if the matching fails, only sending the device identification information to the face recognition device;
the method includes the steps that a detection device detects that an intelligent wearable device enters a set detection range, the detection device obtains device identification information of the intelligent wearable device, preset device information is extracted to be matched and compared with the obtained device identification information of the intelligent wearable device, particularly, if matching fails, only the device identification information is sent to face recognition equipment, the face recognition equipment obtains user face information corresponding to abnormal device identification information and sends the user face information to a server, if the server compares the preset user face information and then matches the preset user face information successfully, the abnormal device identification information is recognized as target device identification information, if matching fails, the server sends a preset gate inhibition machine controller instruction to a gate inhibition machine controller to trigger gate inhibition machine closing gate and execute corresponding alarm operation to remind external personnel of paying attention, based on the characteristic that the intelligent wearable device/the face information correspond to a user identification mark , the real-time is high, data are accurate and data are difficult to forge, it is ensured that unauthorized personnel can not pass through , and safety of identity recognition is improved.
In embodiments, as shown in fig. 3, in step S203, the obtaining of the preset user face information corresponding to the device identification information specifically includes the following steps:
step S301, inquiring a preset database according to the equipment identification information; the preset database stores preset user face information corresponding to the plurality of pieces of equipment identification information.
Step S302, obtaining preset user face information corresponding to the device identification information from a preset database.
The preset database provides a service for reading preset user face information corresponding to a plurality of pieces of equipment identification information, the server takes a plurality of pieces of face information collected in an area or face information pre-imported in other forms as the preset user face information and imports the user face information into the database, namely the preset database is established, particularly, the preset database can always keep an updated state according to actual conditions, the user face information successfully matched by the server can be added into the preset database as updated content, each piece of equipment identification information only corresponds to or a plurality of pieces of preset user face information, but the plurality of pieces of preset user face information need to be determined and the same as the face information of users, the preset face information can be updated after each matching, the updating time and frequency can be determined according to specific real conditions, so that the accuracy and timeliness of the preset user face information can be maintained, the preset database provides the preset identification information and the preset space information for the user equipment, and the preset database can support the rapid matching of the face information of the server according to the required face information.
In embodiments, in step S204, after confirming that the user identification in the set range near the gate-off machine passes, the method further includes obtaining a preset gate-off control command, and sending the preset gate-off control command to the gate-off controller, where the preset gate-off control command is used to trigger the gate-off controller to control the gate-off machine to open.
In the embodiment, a preset gate inhibition machine control command is stored in a database and is called by a server, a gate inhibition machine control command controls a gate inhibition machine through a gate inhibition machine controller, the gate inhibition machine carries out corresponding operation according to specific command content, and a gate inhibition machine is provided with a detection device such as an infrared grating lamp and the like, so that the passing state of a person can be detected.
In the specific implementation, after the server is successfully matched, the server calls a corresponding gate inhibition machine control instruction stored in a database, the gate inhibition machine control instruction is sent to a gate inhibition machine controller, a gate inhibition machine controller obtains the current state of the gate inhibition machine after receiving a 2 gate inhibition machine control instruction, if the gate inhibition machine is in a closed state, the 4 gate inhibition machine is controlled to be opened, if the gate inhibition machine is in an open state, the 5 gate inhibition machine is controlled to be continuously opened, and the gate inhibition machine is closed immediately after people are detected to pass through an infrared grating lamp.
In embodiments, as shown in fig. 4, in step S203, after acquiring the preset user face information corresponding to the device identification information, the method further includes:
step S401, if the matching of the user face information and the preset user face information fails, it is determined that the user identity recognition in the set range near the gate inhibition machine does not pass.
And S402, acquiring a preset alarm instruction, and sending the preset alarm instruction to gate inhibition machine controllers, wherein the preset alarm instruction is used for triggering gate inhibition machine controllers to control gate inhibition machines to execute corresponding alarm operation.
In this embodiment, the preset alarm command may be an audio/video output command set according to the function of the gate inhibition machine, for example, the gate inhibition machine has an audio output function and is provided with a speaker, and the alarm command may be set to a command for playing a preset audio, and it should be noted that the preset alarm command may be a voice alarm prompt, a broadcast alarm prompt, or a flashing alarm lamp, and may be set according to the function of the gate inhibition machine, or may be applied to independent information sending apparatuses, and the application device capable of sending information to remind external people of attracting attention should be the preset alarm command of the present invention, and is not limited specifically here.
In the concrete implementation, when the matching between the user face information acquired by the server and the preset user face information is unsuccessful, the user identity recognition state is modified to be not passed, a preset alarm instruction is extracted from the database and sent to the gate inhibition machine controller, and the gate inhibition machine completes corresponding alarm action according to the acquired specific instruction sent by the gate inhibition machine controller.
It should be noted that, when a server acquires face identification information of a user with multiple persons at the same time, and times of unsuccessful matching of the face information of the user exist, the server sends a command of closing a gate inhibition machine to a gate inhibition machine controller and sends a preset alarm command at the same time, the gate inhibition machine is immediately closed and plays corresponding alarm information to remind external personnel of paying attention, for example, when an external person enters along with the preset person, face identification equipment acquires face information of the external person and sends the face information to the server, when the server fails to match the face information of the user, the server sends a command of closing a gate inhibition machine to the gate inhibition machine controller and sends preset alarm information to the gate inhibition machine to remind the external person of exiting from an forbidden area.
In embodiments, after receiving user face information sent by a face recognition device, if the user face information sent by the face recognition device is multiple user face information, the method further includes, if the multiple user face information is successfully matched with corresponding preset user face information, confirming that multiple user identity identifications in a set range near a gate inhibition machine pass, obtaining a preset 0 gate inhibition machine control instruction, sending the preset 1 gate inhibition machine control instruction to a gate inhibition machine controller, using a preset gate inhibition machine control instruction to trigger a gate inhibition machine controller to control a gate inhibition machine to be opened, if at least user face information is unsuccessfully matched with all preset user face information, obtaining a preset alarm instruction, sending the preset alarm instruction to an gate inhibition machine controller, and using the preset alarm instruction to trigger the gate inhibition machine controller to control the gate inhibition machine to execute corresponding alarm operation.
In this embodiment, a process for handling a situation where a plurality of persons continuously pass through the gate at the same time is further .
In embodiments, if matching between the user face information and the preset user face information is successful, after confirming that the user identification in the set area passes, the method further includes updating the preset user face information, storing the preset user face information in a database, and if matching is successful, adding the user face information obtained by the current matching to the corresponding preset user face information.
In this embodiment, after the matching is successful, the server stores the user face information, which is compared with the preset user face information, in the database, and may set a period according to an actual situation, and replace or more preset user face information in the database with the multiple user face information stored in the database, so as to periodically update the user face information.
In embodiments, as shown in fig. 5, kinds of user forbidden identification devices are provided, which comprise an identification information receiving module 51, a face information receiving module 52, a face information obtaining module 53 and an identification module 54, wherein the identification information receiving module 51, the face information receiving module 52, the face information obtaining module 53 and the identification module 54 are arranged in the device
The detection equipment is embedded in the gate inhibition machine and used for detecting that intelligent wearable equipment is arranged in a set range near the gate inhibition machine and reading equipment identification information carried by the intelligent wearable equipment;
the face recognition device is used for acquiring the face information of the user within a set range near the gate inhibition machine according to the device identification information sent by the detection device;
a face information obtaining module 53, configured to obtain preset user face information corresponding to the device identification information;
and the identity recognition module 54 is configured to confirm that the user identity recognition in the set range near the gate inhibition machine passes if the user face information is successfully matched with the preset user face information.
In embodiments, the identification information receiving module is further configured to receive device identification information sent by the detection device, where the receiving includes receiving target device identification information sent by the detection device, and the detection device is further configured to match the read device identification information carried by the intelligent wearable device with preset device identification information, and if the matching is successful, identify the device identification information as the target device identification information.
In embodiments, the face information obtaining module is further configured to obtain preset user face information corresponding to the device identification information, and the obtaining includes querying a preset database according to the device identification information, where the preset database stores preset user face information corresponding to a plurality of device identification information, and obtaining the preset user face information corresponding to the device identification information from the preset database.
In embodiments, the identity module is further configured to, after confirming that the user identity in the set range near the gate inhibition machine passes, obtain a preset gate inhibition machine control instruction, send the preset gate inhibition machine control instruction to the gate inhibition machine controller, and the preset gate inhibition machine control instruction is used to trigger the gate inhibition machine controller to control the gate inhibition machine to open.
In embodiments, the identity recognition module is further configured to, after obtaining preset user face information corresponding to the device identification information, determine that user identity recognition in a set range near the gate inhibition machine fails if matching between the user face information and the preset user face information fails, obtain a preset alarm instruction, send the preset alarm instruction to the gate inhibition machine controller, and the preset alarm instruction is used to trigger gate inhibition machine controller gate inhibition machine to execute a corresponding alarm operation.
In embodiments, the identity recognition module is further configured to, after receiving the user face information sent by the face recognition device if the user face information sent by the face recognition device is multiple pieces of user face information, determine that multiple pieces of user face information match with corresponding preset user face information successfully, that multiple pieces of user identity recognition in a set range near a gate inhibition machine pass, obtain a preset 0 gate inhibition machine control instruction, send the preset 1 gate inhibition machine control instruction to a gate inhibition machine controller, use a preset gate inhibition machine control instruction to trigger a gate inhibition machine controller to control the gate inhibition machine to open, obtain a preset alarm instruction if at least pieces of user face information match with all preset user face information unsuccessfully, send the preset alarm instruction to an gate inhibition machine controller, and use the preset alarm instruction to trigger the gate inhibition machine controller to control the gate inhibition machine to perform corresponding alarm operation.
In the embodiments, the device identification information sent by the detection device is received, the detection device is embedded in the gate inhibition machine and used for detecting that intelligent wearing devices are arranged in a set range near the gate inhibition machine and reading device identification information carried by the intelligent wearing devices, the user face information sent by the face recognition device is received, the face recognition device is used for obtaining the user face information in the set range near the gate inhibition machine according to the device identification information sent by the detection device and obtaining the preset user face information corresponding to the device identification information, if the user face information is successfully matched with the preset user face information, the user identification in the set range near the gate inhibition machine is confirmed to pass, identity verification at distance and 0 contact is achieved, double verification of the device and face information also avoids entering of external suspicious personnel, the problems of information loss, cracking and identity identification list do not exist, and the safety of identity recognition is greatly improved.
For specific limitation of the user-disabled identification apparatus, reference may be made to the above limitation on the identity identification method of the user-disabled, which is not described herein again, each module in the user-disabled identification apparatus may be wholly or partially implemented by software, hardware, and a combination thereof.
In embodiments, as shown in fig. 1, a identity recognition system for forbidden users is provided, which includes a detection device 101, a face recognition device 102 and a server 103, wherein the server 103 is respectively connected to the detection device 101 and the face recognition device 102, the detection device 101 is further connected to the face recognition device 102, the detection device 101 is embedded in a gate inhibition machine, the server 103 is further connected to a gate inhibition machine controller 104, and the gate inhibition machine controller 104 is further connected to an gate inhibition machine.
The detection device 101 is used for detecting that an intelligent wearable device is arranged in a set area, reading device identification information carried by the intelligent wearable device, and sending the device identification information to the server 103 and the face recognition device 102;
the face recognition device 102 is configured to obtain user face information in a set area according to the device identification information, and send the user face information to the server 103;
a server 103 for executing the steps of disabling the user's identification method;
a gate inhibition controller 104, configured to receive a preset gate inhibition control command sent by the server 103, and control gate inhibition machine to open according to the preset gate inhibition control command
disable the gate, for executing instructions to disable the gate controller 104.
In this embodiment, the identity recognition system of the prohibited user performs identity recognition of the prohibited user through the face recognition device 102 and the detection device 101, so that identity verification of with a fixed distance and 0 contact is realized, double verification of the detection device 101 and the face recognition device 102 also prevents external suspicious people from entering, the problems of information loss, cracking and identity identification list do not exist, and the safety of identity recognition is greatly improved.
In embodiments, there are provided computer devices, which may be servers, the internal structure of which may be as shown in fig. 6, comprising a processor, a memory, a network interface and a database connected by a system bus, wherein the processor of the computer device is used to provide computing and control capabilities.
Those skilled in the art will appreciate that the configuration shown in fig. 6 is a block diagram of only a portion of the configuration associated with the present application and does not constitute a limitation of the disabled identification appliance to which the present application is applied, and that a particular disabled identification appliance may include more or fewer components than shown in the figure, or may combine certain components, or have a different arrangement of components.
In embodiments, computer devices are provided, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
the detection equipment is embedded in the gate inhibition machine and used for detecting that intelligent wearable equipment is arranged in a set range near the gate inhibition machine and reading equipment identification information carried by the intelligent wearable equipment;
the face recognition equipment is used for acquiring the face information of the user within a set range near the gate inhibition machine according to the equipment identification information sent by the detection equipment;
acquiring preset user face information corresponding to the equipment identification information;
and if the user face information is successfully matched with the preset user face information, confirming that the user identity identification in the set range near the gate inhibition machine is passed.
In embodiments, the processor, when executing the computer program, further implements the following steps of receiving device identification information sent by the detection device, including receiving target device identification information sent by the detection device, and the detection device is further configured to match the read device identification information carried by the intelligent wearable device with preset device identification information, and if matching is successful, identify the device identification information as the target device identification information.
In embodiments, the processor when executing the computer program further performs the steps of obtaining pre-set user face information corresponding to the device identification information by querying a pre-set database according to the device identification information, the pre-set database storing pre-set user face information corresponding to the plurality of device identification information, and obtaining pre-set user face information corresponding to the device identification information from the pre-set database.
In embodiments, the processor when executing the computer program further performs the steps of obtaining a preset disable machine control command, sending the preset disable machine control command to the disable machine controller, and the preset disable machine control command is used for triggering the disable machine controller to control the disable machine to open after confirming that the disable machine nearby user identity identification passes.
In embodiments, the processor, when executing the computer program, further performs the following steps of after obtaining preset user face information corresponding to the device identification information, if matching between the user face information and the preset user face information fails, confirming that user identification in a set range near a gate inhibition machine fails, obtaining a preset alarm instruction, and sending the preset alarm instruction to a gate inhibition machine controller, where the preset alarm instruction is used to trigger the gate inhibition machine controller to control gate inhibition machine to execute a corresponding alarm operation.
In embodiments, when the processor executes the computer program, the method further includes the following steps of, after receiving the user face information sent by the face recognition device, confirming that a plurality of user identities in a set range near a gate inhibition machine pass through if the user face information sent by the face recognition device is successfully matched with corresponding preset user face information, obtaining a preset 0 gate inhibition machine control instruction, sending the preset 1 gate inhibition machine control instruction to a gate inhibition machine controller, obtaining a preset gate inhibition machine control instruction for triggering gate inhibition machine controller to control gate inhibition machine to be opened, and if at least user face information is unsuccessfully matched with all preset user face information, obtaining a preset alarm instruction, sending the preset alarm instruction to a gate inhibition machine controller, and triggering gate inhibition machine controller to control gate inhibition machine to execute corresponding alarm operation.
In the embodiments, the server performs forbidden user identity recognition through the face recognition device and the detection device through the forbidden user identity recognition system through the computer program running on the processor, so that constant-distance and 0-contact identity verification is realized, double verification of the device and face information also prevents external suspicious people from entering, the problems of information loss, cracking and identity identification list do not exist, and the identity recognition safety is greatly improved.
In embodiments, computer readable storage media are provided, on which a computer program is stored which, when executed by a processor, performs the steps of:
the detection equipment is embedded in the gate inhibition machine and used for detecting that intelligent wearable equipment is arranged in a set range near the gate inhibition machine and reading equipment identification information carried by the intelligent wearable equipment;
the face recognition equipment is used for acquiring the face information of the user within a set range near the gate inhibition machine according to the equipment identification information sent by the detection equipment;
acquiring preset user face information corresponding to the equipment identification information;
and if the user face information is successfully matched with the preset user face information, confirming that the user identity identification in the set range near the gate inhibition machine is passed.
In embodiments, when executed by the processor, the computer program further implements the steps of receiving device identification information sent by the detection device, including receiving target device identification information sent by the detection device, and the detection device is further configured to match the read device identification information carried by the intelligent wearable device with preset device identification information, and if matching is successful, identify the device identification information as the target device identification information.
In embodiments, the computer program when executed by the processor further performs the steps of obtaining pre-set user face information corresponding to the device identification information by querying a pre-set database based on the device identification information, the pre-set database storing pre-set user face information corresponding to the plurality of device identification information, and obtaining pre-set user face information corresponding to the device identification information from the pre-set database.
In embodiments, the computer program when executed by the processor further performs the steps of obtaining a preset disable machine control command and sending the preset disable machine control command to the disable machine controller after confirming that the user identification within the set range near the disable machine passes, wherein the preset disable machine control command is used for triggering the disable machine controller to control the disable machine to open.
In embodiments, the computer program when executed by the processor further implements the steps of, after obtaining the preset user face information corresponding to the device identification information, determining that user identification in a set range near the gate inhibition machine fails to be recognized if the matching between the user face information and the preset user face information fails, obtaining a preset alarm instruction, and sending the preset alarm instruction to the gate inhibition machine controller, where the preset alarm instruction is used to trigger the gate inhibition machine controller to control gate inhibition machine to execute a corresponding alarm operation.
In embodiments, when executed by a processor, the computer program further implements the following steps that after receiving user face information sent by a face recognition device, if the user face information sent by the face recognition device is multiple pieces of user face information, after the user face information sent by the face recognition device is received, it is determined that multiple user identification passes within a set range near a gate inhibition machine if the multiple pieces of user face information are successfully matched with corresponding preset user face information, a preset 0 gate inhibition machine control instruction is obtained, a preset 1 gate inhibition machine control instruction is sent to a gate inhibition machine controller, a preset gate inhibition machine control instruction is used for triggering the gate inhibition machine controller to control the gate inhibition machine to be opened, if at least pieces of user face information are unsuccessfully matched with all the preset user face information, a preset alarm instruction is obtained, and the preset alarm instruction is sent to an gate inhibition machine controller, and the preset alarm instruction is used for triggering the gate inhibition machine controller to control the gate inhibition machine to perform corresponding alarm operation.
In the embodiments, the computer readable storage medium stores computer programs, and the identity recognition system of the forbidden user performs forbidden user identity recognition through the face recognition device and the detection device, so that distance-fixed 0-touch identity verification is realized, double verification of device and face information also prevents external suspicious people from entering, the problems of information loss, cracking and identity identification list do not exist, and the identity recognition safety is greatly improved.
It will be understood by those of ordinary skill in the art that all or a portion of the processes of the methods of the embodiments described above may be implemented by a computer program that may be stored in a non-volatile computer-readable storage medium, which when executed, may include the processes of the embodiments of the methods described above, wherein any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above examples only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1, A user forbidden identification method, comprising:
the detection equipment is embedded in an gate inhibition machine and used for detecting that intelligent wearable equipment is arranged in a set range near the gate inhibition machine and reading the equipment identification information carried by the intelligent wearable equipment;
the face recognition equipment is used for acquiring user face information within a set range near the gate inhibition machine according to the equipment identification information sent by the detection equipment;
acquiring preset user face information corresponding to the equipment identification information;
and if the user face information is successfully matched with the preset user face information, determining that the user identity recognition in the set range near the gate inhibition machine is passed through by .
2. The method of claim 1, wherein receiving the device identification information sent by the detection device comprises:
receiving target equipment identification information sent by the detection equipment; the detection equipment is further used for matching the read equipment identification information carried by the intelligent wearable equipment with preset equipment identification information, and if the matching is successful, the equipment identification information is recognized as the target equipment identification information.
3. The method according to claim 1, wherein the obtaining of the preset user face information corresponding to the device identification information includes:
inquiring a preset database according to the equipment identification information; the preset database stores preset user face information corresponding to a plurality of pieces of equipment identification information;
and acquiring preset user face information corresponding to the equipment identification information from the preset database.
4. The method of any of claims 1-3, further comprising, after confirming passage of user identification within a set range around the gate inhibition machine:
the method comprises the steps of obtaining a preset gate inhibition machine control instruction, and sending the preset gate inhibition machine control instruction to a gate inhibition machine controller, wherein the preset gate inhibition machine control instruction is used for triggering the gate inhibition machine controller to control the gate inhibition machine to be opened.
5. The method according to any one of claims 1 to 3 and , wherein after acquiring the preset user face information corresponding to the device identification information, the method further comprises:
if the matching of the user face information and the preset user face information fails, determining that the user identity recognition in the set range near the gate inhibition machine does not pass;
the method comprises the steps of obtaining a preset alarm instruction, and sending the preset alarm instruction to an gate inhibition machine controller, wherein the preset alarm instruction is used for triggering the gate inhibition machine controller to control the gate inhibition machine to execute corresponding alarm operation.
6. The method according to any one of claims 1 to 3 and , wherein if the user face information sent by the face recognition device is a plurality of user face information, after receiving the user face information sent by the face recognition device, the method further comprises:
if the plurality of user face information are successfully matched with the corresponding preset user face information, confirming that the plurality of user identity identifications in the set range near the gate inhibition machine pass;
the method comprises the steps of obtaining a preset gate inhibition machine control instruction, and sending the preset gate inhibition machine control instruction to a gate inhibition machine controller, wherein the preset gate inhibition machine control instruction is used for triggering the gate inhibition machine controller to control the gate inhibition machine to be opened;
and if at least pieces of user face information fail to be matched with all the preset user face information, acquiring a preset alarm instruction, and sending the preset alarm instruction to a gate inhibition machine controller, wherein the preset alarm instruction is used for triggering the gate inhibition machine controller to control the gate inhibition machine to execute corresponding alarm operation.
7, a user-disabled identity module, said module comprising:
the detection equipment is embedded in an gate inhibition machine and used for detecting that intelligent wearable equipment is arranged in a set range near the gate inhibition machine and reading the equipment identification information carried by the intelligent wearable equipment;
the face recognition equipment is used for acquiring user face information within a set range near the gate inhibition machine according to the equipment identification information sent by the detection equipment;
the face information acquisition module is used for acquiring preset user face information corresponding to the equipment identification information;
and the identity recognition module is used for confirming that the identity recognition of the user in the set range near the gate inhibition machine passes if the face information of the user is successfully matched with the preset face information of the user.
8, identity recognition system of forbidden users, which is characterized by comprising a detection device, a face recognition device and a server, wherein the server is respectively connected with the detection device and the face recognition device, the detection device is also connected with the face recognition device, the detection device is embedded in a forbidden machine, the server is also connected with an forbidden machine controller, and the forbidden machine controller is also connected with the forbidden machine;
the detection device is used for detecting that intelligent wearable devices are arranged in a set range near the gate inhibition machine, reading device identification information carried by the intelligent wearable devices, and sending the device identification information to the server and the face recognition device;
the face recognition device is used for acquiring user face information within a set range near the gate inhibition machine according to the device identification information and sending the user face information to the server;
the server for performing the steps of the user disabled identification method of any of claims 1-6;
the gate inhibition machine controller is used for receiving a preset gate inhibition machine control instruction sent by the server and controlling the gate inhibition machine to be opened according to the preset gate inhibition machine control instruction.
Computer device of , comprising a memory and a processor, the memory storing a computer program, wherein the processor when executing the computer program is configured to carry out the steps of the method of any of claims 1 to 6 as claimed in .
10, computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any of claims 1 to 6, wherein represents a set of instructions for carrying out the method.
CN201910887841.1A 2019-09-19 2019-09-19 forbidden user identification method, device, system and computer equipment Pending CN110738769A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910887841.1A CN110738769A (en) 2019-09-19 2019-09-19 forbidden user identification method, device, system and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910887841.1A CN110738769A (en) 2019-09-19 2019-09-19 forbidden user identification method, device, system and computer equipment

Publications (1)

Publication Number Publication Date
CN110738769A true CN110738769A (en) 2020-01-31

Family

ID=69268189

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910887841.1A Pending CN110738769A (en) 2019-09-19 2019-09-19 forbidden user identification method, device, system and computer equipment

Country Status (1)

Country Link
CN (1) CN110738769A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111260838A (en) * 2020-02-27 2020-06-09 广州羊城通有限公司 Face brushing passing method based on local identification and gate equipment
CN111540110A (en) * 2020-05-13 2020-08-14 四川天翼网络服务有限公司 Gate entrance guard
CN111599060A (en) * 2020-05-22 2020-08-28 日立楼宇技术(广州)有限公司 Online service management method, device and system
CN111862434A (en) * 2020-07-30 2020-10-30 上海茂声智能科技有限公司 Pedestrian passing control system and method
CN111862416A (en) * 2020-08-12 2020-10-30 上海茂声智能科技有限公司 Pedestrian passing control system and method
CN112347832A (en) * 2020-06-12 2021-02-09 深圳Tcl新技术有限公司 Unlocking method, device and equipment based on face recognition and computer storage medium
CN112712625A (en) * 2020-12-31 2021-04-27 重庆文理学院 Intelligent community management system and method
CN112907798A (en) * 2021-03-30 2021-06-04 重庆文理学院 Intelligent security system based on 5G technology
CN113345147A (en) * 2021-06-08 2021-09-03 宋翔 Opening method of intelligent equipment
CN113362499A (en) * 2021-05-25 2021-09-07 广州朗国电子科技有限公司 Embedded face recognition intelligent door lock
CN113516805A (en) * 2021-03-09 2021-10-19 北京戴纳实验科技有限公司 Intercellular access control system and intercellular safe access method
CN113763620A (en) * 2021-09-14 2021-12-07 孟琦 Combined access control, method and device for controlling combined access control, and storage medium
CN114241648A (en) * 2021-11-29 2022-03-25 浙江大华技术股份有限公司 Access control method, device and equipment
CN114387715A (en) * 2022-01-12 2022-04-22 深圳市锐宝智联信息有限公司 Face recognition gate, gate control method, terminal device and storage medium
CN114882630A (en) * 2022-04-27 2022-08-09 广东职业技术学院 Internet of things access control system and control method thereof

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2015194930A (en) * 2014-03-31 2015-11-05 セコム株式会社 Information processing device and information processing system
CN205068523U (en) * 2015-08-21 2016-03-02 云南清眸科技有限公司 Intelligent access control system based on ID card combines authentication of people's face
CN105931325A (en) * 2016-04-15 2016-09-07 上海快健身体育管理有限公司 Gym intelligent management system and method
CN108806041A (en) * 2018-05-29 2018-11-13 深圳市零度智控科技有限公司 Building access control method, Cloud Server and computer readable storage medium
CN109544737A (en) * 2018-11-01 2019-03-29 深圳市靓工创新应用科技有限公司 User's passing method and system
CN109934976A (en) * 2019-02-01 2019-06-25 Oppo广东移动通信有限公司 Access control management method, device, system, electronic equipment and storage medium
CN110032967A (en) * 2019-04-10 2019-07-19 深圳市万睿智能科技有限公司 A method of trailing personnel are identified under the current scene of more people

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2015194930A (en) * 2014-03-31 2015-11-05 セコム株式会社 Information processing device and information processing system
CN205068523U (en) * 2015-08-21 2016-03-02 云南清眸科技有限公司 Intelligent access control system based on ID card combines authentication of people's face
CN105931325A (en) * 2016-04-15 2016-09-07 上海快健身体育管理有限公司 Gym intelligent management system and method
CN108806041A (en) * 2018-05-29 2018-11-13 深圳市零度智控科技有限公司 Building access control method, Cloud Server and computer readable storage medium
CN109544737A (en) * 2018-11-01 2019-03-29 深圳市靓工创新应用科技有限公司 User's passing method and system
CN109934976A (en) * 2019-02-01 2019-06-25 Oppo广东移动通信有限公司 Access control management method, device, system, electronic equipment and storage medium
CN110032967A (en) * 2019-04-10 2019-07-19 深圳市万睿智能科技有限公司 A method of trailing personnel are identified under the current scene of more people

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111260838A (en) * 2020-02-27 2020-06-09 广州羊城通有限公司 Face brushing passing method based on local identification and gate equipment
CN111540110A (en) * 2020-05-13 2020-08-14 四川天翼网络服务有限公司 Gate entrance guard
CN111599060A (en) * 2020-05-22 2020-08-28 日立楼宇技术(广州)有限公司 Online service management method, device and system
CN112347832A (en) * 2020-06-12 2021-02-09 深圳Tcl新技术有限公司 Unlocking method, device and equipment based on face recognition and computer storage medium
CN112347832B (en) * 2020-06-12 2024-02-09 深圳Tcl新技术有限公司 Unlocking method, device, equipment and computer storage medium based on face recognition
CN111862434A (en) * 2020-07-30 2020-10-30 上海茂声智能科技有限公司 Pedestrian passing control system and method
CN111862416A (en) * 2020-08-12 2020-10-30 上海茂声智能科技有限公司 Pedestrian passing control system and method
CN112712625A (en) * 2020-12-31 2021-04-27 重庆文理学院 Intelligent community management system and method
CN113516805B (en) * 2021-03-09 2023-01-17 北京戴纳实验科技有限公司 Intercellular access control system and intercellular safe access method
CN113516805A (en) * 2021-03-09 2021-10-19 北京戴纳实验科技有限公司 Intercellular access control system and intercellular safe access method
CN112907798A (en) * 2021-03-30 2021-06-04 重庆文理学院 Intelligent security system based on 5G technology
CN113362499A (en) * 2021-05-25 2021-09-07 广州朗国电子科技有限公司 Embedded face recognition intelligent door lock
CN113345147A (en) * 2021-06-08 2021-09-03 宋翔 Opening method of intelligent equipment
CN113763620A (en) * 2021-09-14 2021-12-07 孟琦 Combined access control, method and device for controlling combined access control, and storage medium
CN114241648A (en) * 2021-11-29 2022-03-25 浙江大华技术股份有限公司 Access control method, device and equipment
CN114387715A (en) * 2022-01-12 2022-04-22 深圳市锐宝智联信息有限公司 Face recognition gate, gate control method, terminal device and storage medium
CN114882630A (en) * 2022-04-27 2022-08-09 广东职业技术学院 Internet of things access control system and control method thereof

Similar Documents

Publication Publication Date Title
CN110738769A (en) forbidden user identification method, device, system and computer equipment
CN104966344B (en) A kind of security access control system based on video
US20220028237A1 (en) Digital fingerprint tracking
WO2020019673A1 (en) Construction site monitoring method and device based on image analysis, and readable storage medium
CN106934787B (en) Intelligent access control method, system, server and equipment
CN104881911A (en) System And Method Having Biometric Identification Instrusion And Access Control
US20140150049A1 (en) Method and apparatus for controlling management of mobile device using security event
KR102012672B1 (en) Anti-crime system and method using face recognition based people feature recognition
CN109243026A (en) A kind of caller management method and system
US20210209877A1 (en) Facial recognition frictionless access control
CN204990444U (en) Intelligent security controlgear
JP2004265231A (en) Face picture recording system and method
CN113076859A (en) Safety monitoring method and system for face recognition, electronic equipment and storage medium
CN110555918A (en) Attendance management method and attendance management equipment
CN108230517B (en) Access control releasing method and device and electronic equipment
KR101728158B1 (en) Fire safety management and security agency system, and method therefor
CN114937237A (en) Construction site safety monitoring method and system based on AI intelligent identification
CN110246292B (en) Household video monitoring method, device and storage medium
CN112352408B (en) Intruder detection method and device
CN108540357B (en) Voice control method and device and sound equipment
CN112802252B (en) Intelligent building safety management method, system and storage medium based on Internet of things
CN110768942B (en) Identity authentication system
US10559142B2 (en) Information processing system
CN111696239A (en) Artificial intelligence identification system based on computer
CN113139104B (en) Information processing system and control method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200131

RJ01 Rejection of invention patent application after publication