CN111145403A - Security management method and system - Google Patents

Security management method and system Download PDF

Info

Publication number
CN111145403A
CN111145403A CN201911376175.1A CN201911376175A CN111145403A CN 111145403 A CN111145403 A CN 111145403A CN 201911376175 A CN201911376175 A CN 201911376175A CN 111145403 A CN111145403 A CN 111145403A
Authority
CN
China
Prior art keywords
information
certificate
image information
matched
employee
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911376175.1A
Other languages
Chinese (zh)
Inventor
张振
毛翔宇
吴思宇
梁芳
王红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN201911376175.1A priority Critical patent/CN111145403A/en
Publication of CN111145403A publication Critical patent/CN111145403A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

The disclosure relates to a security management method and a security management system, which aim to solve the problem of inconvenient security management, and the method comprises the following steps: acquiring image information and certificate information of a user; judging whether pre-stored information contains target image information matched with the image information and target certificate information matched with the certificate information; and if the pre-stored information contains target image information matched with the image information and target certificate information matched with the certificate information, generating release information for representing permission to pass.

Description

Security management method and system
Technical Field
The disclosure relates to the technical field of security management, in particular to a security management method and a security management system.
Background
"wisdom garden" is the intelligent management system who establishes on the basis of garden information-based construction to help the garden to establish unified internal and external service operation platform, thereby improve garden security protection efficiency, promote the official working security and the business turn over convenience of garden income enterprise, realize that garden management is humanized, intelligent. The intelligent management system is used for intelligently controlling each device, so that the problems of inaccurate management of park personnel in and out, low manual management efficiency and the like are solved.
Disclosure of Invention
The disclosure aims to provide a security management method and a security management system, so as to solve the problem of inconvenient security management.
In order to achieve the above object, a first aspect of the present disclosure provides a security management method, where the method includes:
acquiring image information and certificate information of a user;
judging whether pre-stored information contains target image information matched with the image information and target certificate information matched with the certificate information;
and if the pre-stored information contains target image information matched with the image information and target certificate information matched with the certificate information, generating release information for representing permission to pass.
Optionally, the image information includes facial feature information and vehicle image information, and the certificate information includes identification card information and employee card information;
if the pre-stored information contains target image information matched with the image information and target certificate information matched with the certificate information, generating release information for representing permission to pass, including:
and if target image information matched with the facial feature information and/or the vehicle image information exists in the prestored information, and target certificate information matched with the identity card information and/or the employee card information exists in the prestored information, generating release information for representing permission to pass.
Optionally, the pre-stored information includes reserved visiting information, wherein the reserved visiting information includes reserved facial feature information uploaded by a user when a user reserves visiting, reserved vehicle image information and reserved identity document information;
the method further comprises the following steps:
receiving the reserved visiting information of the user;
if the pre-stored information contains target image information matched with the image information and target certificate information matched with the certificate information, generating release information for representing permission to pass, including:
if the reserved facial feature information contains target image information matched with the facial feature information and the reserved identity document information contains target document information matched with the identity card information, generating release information for representing permission to pass;
alternatively, the first and second electrodes may be,
and if the reserved vehicle image information contains target image information matched with the vehicle image information and the reserved identity document information contains target document information matched with the identity card information, generating release information for representing permission to pass.
Optionally, the pre-stored information includes a white list and a gray list, where the gray list indicates that the user is an appointment visitor and is allowed to enter and exit, and the white list indicates that the user is an internal employee and is allowed to enter and exit;
if the pre-stored information contains target image information matched with the image information and target certificate information matched with the certificate information, generating release information for representing permission to pass, including:
if so;
alternatively, the first and second electrodes may be,
if the target image information matched with the image information exists in the grey list and the target certificate information matched with the certificate information exists, determining the access authority of the user;
and generating release information for representing permission to pass according to the access authority, and monitoring the whereabouts of the user after the user enters.
Optionally, the pre-stored information includes a blacklist, where the blacklist indicates that the user is a control object and is not allowed to enter;
the method further comprises the following steps:
and if the blacklist has target image information matched with the image information and the acquisition time length and/or the acquisition frequency of the image information exceed a first preset threshold value in a first preset time period, sending an alarm prompt.
Optionally, the method further comprises:
if the pre-stored information does not have target image information matched with the image information or target certificate information matched with the certificate information, generating and sending non-passing information for representing unsuccessful verification of information, wherein the non-passing information comprises the certificate information and the image information;
and generating releasing information for representing the permission after receiving the permission instruction.
Optionally, the method further comprises:
according to the release information, visitor information and employee information are generated, wherein the visitor information comprises the number of visitors, and the employee information comprises employee attendance information, employee attendance information and vehicle attendance information;
and sending the visitor information and the employee information so as to display the visitor information and the employee information on corresponding user interfaces.
The second aspect of the present disclosure discloses a security management system, the system comprising: the certificate reading device is in communication connection with the controller, and the camera is in communication connection with the controller;
the certificate reading equipment is used for collecting certificate information of a user, wherein the certificate information comprises identity card information and employee card information;
the camera is used for collecting image information, and the image information comprises facial feature information and vehicle image information;
the controller is configured to:
acquiring the image information and the certificate information;
judging whether pre-stored information contains target image information matched with the image information and target certificate information matched with the certificate information;
and if the pre-stored information contains target image information matched with the image information and target certificate information matched with the certificate information, generating release information for representing permission to pass.
Optionally, the system further comprises a duty machine;
the attendance machine is in communication connection with the controller and is used for receiving traffic prohibition information which is sent by the controller and used for indicating that the information verification is unsuccessful, wherein the traffic prohibition information comprises the certificate information and the image information;
the controller is further configured to:
if the pre-stored information does not have target image information matched with the image information or target certificate information matched with the certificate information, generating non-passing information for representing unsuccessful information verification;
sending the no-pass information to the duty machine;
and generating release information for representing the permission of the passage after receiving the passage permission instruction sent by the duty machine.
Optionally, the system further comprises a display screen;
the display screen is in communication connection with the controller and is used for displaying visitor information and employee information, wherein the visitor information comprises the number of visitors, and the employee information comprises employee attendance information, employee attendance information and vehicle attendance information;
the controller is further configured to:
generating the visitor information and the employee information;
and sending the visitor information and the employee information to the display screen.
Through the technical scheme, the following technical effects can be at least achieved:
through reading certificate information and collecting image information, only when target image information matched with the image information exists in prestored information and target certificate information matched with the certificate information exists, release information used for representing permission to pass is generated, a user is allowed to enter a park, the user who finds or borrows other-person certificates cannot enter and exit the park by virtue of the certificate, the security safety of the park is improved, the certificate information can be identity card information and employee card information, and an employee can enter and exit the park by virtue of the identity card or the employee card, so that the convenience of security management is improved. Furthermore, the visitor can also use effective identity documents such as the identity card to pass in and out the park, does not need to be manually registered every time, and improves the efficiency of the security management of the park.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows.
Drawings
The accompanying drawings, which are included to provide a further understanding of the disclosure and are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description serve to explain the disclosure without limiting the disclosure. In the drawings:
FIG. 1 is a flow diagram illustrating a security management method in accordance with an exemplary embodiment.
FIG. 2 is a flow diagram illustrating another security management method in accordance with an exemplary embodiment.
FIG. 3 is a flow diagram illustrating another security management method in accordance with an exemplary embodiment.
FIG. 4 is a flow diagram illustrating another security management method in accordance with an exemplary embodiment.
FIG. 5 is a flow diagram illustrating another security management method in accordance with an illustrative embodiment.
FIG. 6 is a block diagram illustrating a security management system in accordance with an exemplary embodiment.
FIG. 7 is a block diagram illustrating another security management system in accordance with an exemplary embodiment.
FIG. 8 is a block diagram illustrating another security management system in accordance with an exemplary embodiment.
FIG. 9 is a schematic diagram illustrating a security management system in accordance with an exemplary embodiment.
Detailed Description
The following detailed description of specific embodiments of the present disclosure is provided in connection with the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating the present disclosure, are given by way of illustration and explanation only, not limitation.
In the related technology, the employee needs to read the employee card in the certificate reading device when entering or exiting the park, if the employee forgets to take the employee card, the employee needs to be manually registered to enter or exit the park, and the security management of the park is inconvenient. Moreover, if the employee card is lost, the operator card can be accessed by non-garden personnel, and the like, so that the security of the garden is reduced. In addition, foreign visitors and vehicles all need manual registration every time when entering and exiting the park, so that the visitors cannot conveniently enter and exit the park, and further, the manual registration is low in efficiency.
FIG. 1 is a flow diagram illustrating security management according to an example embodiment. As shown in fig. 1, the method includes:
s101, acquiring image information and certificate information of a user.
The certificate information comprises identity card information and/or employee card information, and the image information comprises facial feature information and/or vehicle image information.
S102, judging whether pre-stored information contains target image information matched with the image information and target certificate information matched with the certificate information.
S103, if target image information matched with the image information exists in the prestored information and target certificate information matched with the certificate information exists, generating release information for representing permission to pass.
When the method is specifically implemented, the magnetic stripe information in the certificate can be read, and the certificate information can be collected. The certificate information acquisition and the image information acquisition are corresponding, namely equipment for acquiring the certificate information of the user and equipment for acquiring the image information of the user, which are arranged at an inlet and an outlet of the park, are in a set. Optionally, the device for collecting image information may be started to collect the image information of the user when the certificate information of the user is collected.
Illustratively, when a user is ready to enter a park, employee card information of the user is collected, and further, a camera is turned on, the user is prompted to collect image information, and the camera is started to collect image information, for example, the camera is started to collect facial feature information of the user.
In another example, when the employee card information of the user is collected in preparation for entering the area, a camera at the entrance of the vehicle is started to collect the image information of the vehicle, and the license plate number of the vehicle is identified from the image information of the vehicle.
Whether target image information matched with the image information exists in the prestored information or not and target certificate information matched with the certificate information are judged, for example, whether target image information matched with the image information exists in the prestored information or not and whether target certificate information matched with the name and the certificate number exists in the prestored information or not are judged.
If the prestored information contains target image information matched with the image information and target certificate information matched with the certificate information, and the target image information corresponds to the target certificate information, for example, the target certificate information of the employee A corresponds to the target image information of the employee A, release information used for representing permission is generated and sent to the access control equipment, and the access control equipment controls fences and the like to be opened according to the release information to allow users to enter and exit the park.
According to the technical scheme, through reading the certificate information and collecting the image information, only the target image information matched with the image information exists in the prestored information, and when the target certificate information matched with the certificate information exists, the release information used for representing permission to pass is generated, the user is allowed to enter the park, the user of other certificates is picked or borrowed, the user can not pass in and out the park by virtue of the certificate, the security and protection safety of the park is improved, the certificate information can be ID card information and employee card information, and the employee can pass in and out the park by virtue of the ID card or the employee card, so that the convenience of security and protection management is improved. Furthermore, the visitor can also use effective identity documents such as the identity card to pass in and out the park, does not need to be manually registered every time, and improves the efficiency of the security management of the park. .
Optionally, the image information includes facial feature information and vehicle image information, and the certificate information includes identification card information and employee card information;
if the pre-stored information contains target image information matched with the image information and target certificate information matched with the certificate information, generating release information for representing permission to pass, including:
and if target image information matched with the facial feature information and/or the vehicle image information exists in the prestored information, and target certificate information matched with the identity card information and/or the employee card information exists in the prestored information, generating release information for representing permission to pass.
Optionally, the facial feature information is facial feature information of a user who prepares to enter and exit the park, and the vehicle image information is license plate numbers and vehicle color information of vehicles which prepare to enter and exit the park. If the user drives the vehicle to prepare for entering and exiting the park, the license plate number of the vehicle can be obtained first, and further, the user is prompted to collect facial feature information. Or after the license plate number of the vehicle is acquired, the facial feature information of the user is not collected any more.
The identity card information comprises the name and the identification number of the user, and the employee card information comprises the name, the gender, the identification number, the internal personnel number, the facial feature information, the affiliated department and the position of the employee. In specific implementation, only the identity card information or the employee card information of the user needs to be collected. It will be appreciated that any document reading can be selected if the user places both the identification card and the employee card in the reading area of the document reading device.
In a possible implementation manner, certificate information of a user is acquired first, whether target certificate information matched with the identity card information and/or the employee card information exists in prestored information or not is judged, if the target certificate information matched with the identity card information or the target certificate information matched with the employee card information exists in the prestored information, the image information is acquired, whether target image information matched with facial feature information and/or a license plate number exists in the prestored information or not is judged, and if the target image information matched with the facial feature information exists in the prestored information or the target image information matched with the license plate number exists in the prestored information, release information used for representing permission to pass is generated.
Optionally, the pre-stored information includes reserved visiting information, wherein the reserved visiting information includes reserved facial feature information uploaded by a user at a time of a reserved visit, reserved vehicle image information, and reserved identity document information.
FIG. 2 is a flow diagram illustrating security management in accordance with an exemplary embodiment. As shown in fig. 2, the method includes:
s201, receiving the reserved visiting information of the user.
S202, acquiring image information and certificate information of a user.
S203, judging whether target image information matched with reserved facial feature information or reserved vehicle image information and target certificate information matched with reserved identity certificate information exist in prestored information.
And S204, if target image information matched with the reserved facial feature information or reserved vehicle image information exists in the prestored information and target certificate information matched with the reserved identity certificate information exists, generating release information for representing permission.
In a possible implementation manner, a user can complete the reservation of the public number by paying attention to the public number and uploading certificate information, image information and visiting time information through the public number, can also complete the online reservation through uploading certificate information, image information and visiting time information such as official websites, short messages, e-mails and the like, and can also adopt telephone reservation and site reservation so as to create prestored information according to the reserved visitor information.
When the image information and the certificate information of the user are acquired, whether target image information of reserved facial feature information or reserved vehicle image information exists in prestored information and target certificate information matched with the reserved identity certificate information is judged, the target image information of the reserved facial feature information or reserved vehicle image information exists in the prestored information, and the target certificate information matched with the reserved identity certificate information exists, release information used for representing permission is generated and sent to the entrance guard equipment, the entrance guard equipment controls fences and the like to be opened according to the release information, and the user is allowed to enter and exit the park area. Through the mode of reservation, can reduce the time of waiting in line, improve security protection management's efficiency, save time resource.
Alternatively, the certificate reading device may be a camera, and the certificate number and the like are photographed by the camera to obtain the certificate information, for example, when the user makes a reservation using a telephone, in this case, the magnetic stripe information of the certificate cannot be obtained at the time of the reservation, the certificate number may be entered, and a department information base such as public security is accessed to obtain the image information of the user, for example, the facial feature information, through the certificate number.
Optionally, the pre-stored information includes a white list and a gray list, where the gray list indicates that the user is an appointment visitor and is allowed to enter and exit, and the white list indicates that the user is an internal employee and is allowed to enter and exit;
if the pre-stored information contains target image information matched with the image information and target certificate information matched with the certificate information, generating release information for representing permission to pass, including:
if the white list has target image information matched with the image information and target certificate information matched with the certificate information, generating release information for representing permission;
alternatively, the first and second electrodes may be,
if the target image information matched with the image information exists in the grey list and the target certificate information matched with the certificate information exists, determining the access authority of the user;
and generating release information for representing permission to pass according to the access authority, and monitoring the whereabouts of the user after the user enters.
In a possible implementation manner, if target image information matched with the image information and target certificate information matched with the certificate information exist in the gray list, and the image information collection times exceed a first preset threshold value within a first preset time period, the certificate information and the image information are moved from the gray list information to the white list information.
For example, within 15 days, if the image information of the user A is collected for more than 10 times, the user A is determined to frequently go in and out of the park, and in order to avoid tracking the user A all the time and wasting camera resources, the certificate information and the image information corresponding to the user A are moved from grey list information to white list information. And when the user A arrives at the park again, after certificate information and image information are acquired, whether target image information matched with the image information exists in the white list or not and target certificate information matched with the certificate information are judged. Therefore, certificate information and image information in the grey list and the white list can be reasonably managed, and resource occupation is reduced.
FIG. 3 is a flow diagram illustrating security management in accordance with an exemplary embodiment. As shown in fig. 3, the method includes:
s301, acquiring image information and certificate information of a user.
S302, whether target image information matched with the image information exists in a white list or a gray list or not and target certificate information matched with the certificate information are judged.
And S303, if the target image information matched with the image information exists in the white list and the target certificate information matched with the certificate information exists, generating release information for representing permission.
S304, if the target image information matched with the image information exists in the grey list and the target certificate information matched with the certificate information exists, determining the access authority of the user.
S305, according to the access authority, generating release information for representing permission to pass, and monitoring the whereabouts of the user after the user enters.
In a possible implementation manner, if target image information matched with the image information exists in the white list and target certificate information matched with the certificate information exists, for example, target certificate information matched with the identity card number of the employee a exists in the white list, and target image information matched with the image information of the employee a exists in the white list, and it is determined that the user to enter is the employee a, the passing information for representing permission is generated.
Optionally, when the user drives the vehicle to leave the park area, the vehicle is determined to be a public vehicle by presetting the license plate number in the vehicle image information, and the vehicle is allowed to go out for three hours under the condition that the vehicle goes out for no provision, timing is started when the vehicle leaves the park area, if the vehicle does not enter the park area for more than 3 hours, the vehicle is determined to go out for more than a specified time, and the information is recorded and prompt information is sent to related personnel.
In another possible implementation mode, the visitor A reserves visiting information through the WeChat public number, and visiting information including pre-stored information of the visitor A is created in a grey list and comprises identity card number information and a license plate number of the visitor A. When the image information and the certificate information of the visitor A are acquired, whether target image information matched with the image information exists in a white list or a gray list or not and target certificate information matched with the certificate information are judged. And if the target image information matched with the license plate number of the visitor A and the target certificate information matched with the identity card number information of the visitor A exist in the grey list, generating release information for representing permission.
Therefore, through the management of the grey list and the white list, internal workers and visitors are distinguished, and the security of the park can be improved.
Optionally, the pre-stored information includes a blacklist, where the blacklist indicates that the user is a control object and is not allowed to enter;
the method further comprises the following steps:
and if the blacklist has target image information matched with the image information and the acquisition time length and/or the acquisition frequency of the image information exceed a first preset threshold value in a first preset time period, sending an alarm prompt.
Optionally, the user in the blacklist information may be an offender who has once collided with the security personnel or has forcibly cleared the offender, and in this case, the control on the offender can be strengthened.
In one possible implementation, the number of cameras may be increased, and the cameras may be arranged at a place far from the entrance/exit of the campus, for example, a place such as a store associated with the campus, and it is determined whether the user is intentionally staying according to the collection time and/or the collection times of the collected facial feature information of the user. For example, the user B does not go out of a surrounding shop in one day, but always goes out of an entrance and exit position of a certain region, and if the total time of the user B staying in the region is collected to exceed 2 hours, an alarm prompt is sent to security personnel to remind the security personnel to pay attention to the user B. For another example, within three days, if the number of times of collecting the image information of the user b exceeds 6 times, an alarm prompt is sent to the security personnel to remind the security personnel to pay attention to the user b.
Like this, can enlarge the collection image information scope in surrounding area, can early warning safety control in advance, increased the security of garden security protection.
Optionally, the method comprises:
if the pre-stored information does not have target image information matched with the image information or target certificate information matched with the certificate information, generating and sending non-passing information for representing unsuccessful verification of information, wherein the non-passing information comprises the certificate information and the image information;
and generating releasing information for representing the permission after receiving the permission instruction.
FIG. 4 is a flow diagram illustrating security management in accordance with an exemplary embodiment. As shown in fig. 4, the method includes:
s401, acquiring image information and certificate information of a user.
S402, judging whether the pre-stored information contains target image information matched with the image information and target certificate information matched with the certificate information.
S403, if the pre-stored information does not have target image information matched with the image information or target certificate information matched with the certificate information, generating and sending no-pass information for indicating that the information verification is unsuccessful.
S404, after receiving the pass permission command, generating release information for representing the pass permission.
Specifically, if target certificate information matched with the certificate information does not exist in the prestored information, the image information is acquired, no-pass information is generated according to the certificate information and the image information, and the no-pass information is sent to the terminal electronic equipment of the security personnel.
Illustratively, the name and the identification number of the first collected on the identification reading device are acquired, target identification information matched with the name and the identification number of the first does not exist in the prestored information, the facial feature information of the first is acquired through the camera, no-passing information is generated according to the name, the identification number and the facial feature information of the first, the no-passing information is sent to the duty machine, security personnel can determine whether to pass after knowing the condition, if the condition determines that the passing can be passed, a passing allowing instruction is sent to the duty machine, and after the passing allowing instruction sent by the duty machine is received, passing information for representing the passing is generated to allow the user to leave the park area. Therefore, when target certificate information matched with the certificate information does not exist in the prestored information, no reservation or no-park personnel are determined, the park is forbidden to enter and exit, the security of the park security is improved, security personnel can allow the park to enter and exit according to the condition, and the convenience of park security management is improved.
If target certificate information matched with the certificate information exists in the prestored information, acquiring the image information, further judging whether the prestored information contains target image information matched with the facial feature information or the license plate number, if the prestored information does not contain the target image information matched with the facial feature information, and does not contain the target image information matched with the license plate number, generating no-pass information according to the certificate information and the image information, and sending the no-pass information to the terminal electronic equipment of security personnel.
Illustratively, the name and employee certificate number of employee B collected on a certificate reading device are obtained, target certificate information matched with the name and employee certificate number exists in prestored information, facial feature information of a user is obtained through a camera, whether the facial feature information of employee B in the prestored information is matched with the collected facial feature information of the user is judged, if the facial feature information of employee B in the prestored information is not matched with the collected facial feature information of the user, no-pass information is generated according to the name and employee certificate number of employee B and the facial feature information of the user, the no-pass information is sent to a duty machine, security personnel can determine whether to pass after knowing the situation, if the situation is determined to pass, for example, the facial feature information of employee B in the prestored information is not matched with the collected facial feature information of the user due to facial injury, a passage allowing instruction is sent on the duty machine, and after the passage allowing instruction sent by the duty machine is received, release information for representing passage allowing is generated, and the user is allowed to leave the park. Therefore, when target certificate information matched with the certificate information exists in the prestored information, the prestored information does not have the target image information matched with the image information, the fact that the user does not accord with the certificate is determined, the user is forbidden to enter and exit the park, the security of the park security is improved, security personnel can allow the user to enter and exit the park according to the situation, and the convenience of the park security management is improved.
Optionally, after the image information of the user is collected, the user may be prompted to input the purpose of visiting at the corresponding user device, for example, a visiting unit or department is selected through the electronic touch screen, and the visiting unit or department is called by the visitor, or the visiting unit or department is directly described through the voice input device. The no-pass information may include the purpose of the visit entered by the user so that security personnel can accurately determine whether to allow the visitor to enter. After the electronic equipment of the security personnel sends the passing permission instruction and receives the passing permission instruction, the passing information used for representing the passing permission is generated so that the entrance guard and the like can open the passing.
Optionally, the method further comprises:
according to the release information, visitor information and employee information are generated, wherein the visitor information comprises the number of visitors, and the employee information comprises employee attendance information, employee attendance information and vehicle attendance information;
and sending the visitor information and the employee information so as to display the visitor information and the employee information on a corresponding user interface.
FIG. 5 is a flow diagram illustrating security management in accordance with an exemplary embodiment. As shown in fig. 5, the method includes:
s501, acquiring image information and certificate information of a user.
S502, judging whether the pre-stored information contains target image information matched with the image information and target certificate information matched with the certificate information.
S503, if target image information matched with the image information exists in the prestored information and target certificate information matched with the certificate information exists, generating release information for representing permission to pass.
And S504, generating visitor information and employee information according to the release information.
And S505, sending the visitor information and the employee information so that the visitor information and the employee information are displayed on corresponding user interfaces.
Optionally, the number of visitors entering the campus may be counted according to the real-time visitor information of one day, and the attendance condition of internal employees, employee exit information and vehicle exit information may also be counted.
For example, from 00:00 to 24:00 of each day, the number of visitors entering the park and the number of visitors leaving the park are counted, so that the security management of the park is enhanced.
Optionally, the statistical number of visitors is sent to an electronic device of a department, such as a security department, having authority to manage security of the campus, so that the relevant department can know the number of visitors and clearly know the security state of the campus. The attendance information of the staff, the attendance information of the staff and the vehicle information of the vehicle are sent to office computers of departments with attendance authority such as human resources, so that management personnel can know the attendance condition, the attendance condition and the like of the staff in time, and staff management is enhanced. And when the employee asks for leave for timeout, the employee can be found in time, and the employee management is enhanced.
FIG. 6 is a block diagram illustrating a security management system in accordance with an exemplary embodiment. As shown in fig. 6, the system 600 includes: a controller 610, a credential reading device 620 communicatively coupled to the controller 610, and a camera 620 communicatively coupled to the controller 610.
The certificate reading device 620 is configured to collect certificate information of a user, where the certificate information includes identification card information and employee card information;
the camera 630 is configured to collect image information, where the image information includes facial feature information and vehicle image information;
the controller 610 is configured to:
acquiring the image information and the certificate information;
judging whether pre-stored information contains target image information matched with the image information and target certificate information matched with the certificate information;
and if the pre-stored information contains target image information matched with the image information and target certificate information matched with the certificate information, generating release information for representing permission to pass.
According to the system, through reading certificate information and collecting image information, only when target image information matched with the image information exists in prestored information and target certificate information matched with the certificate information exists, release information used for representing permission to pass is generated, a user is allowed to enter a park, the user who finds or borrows other-person certificates cannot enter or exit the park by means of the certificate, the security and protection safety of the park are improved, the certificate information can be ID card information and employee card information, and an employee can enter or exit the park through the ID card or the employee card, so that the convenience of security and protection management is improved. Furthermore, the visitor can also use effective identity documents such as the identity card to pass in and out the park, does not need to be manually registered every time, and improves the efficiency of the security management of the park.
FIG. 7 is a block diagram illustrating a security management system in accordance with an exemplary embodiment. As shown in fig. 7, the system 600 further includes a duty machine 710; namely, the system 600 includes: controller 610, credential reading device 620, camera 630, and duty machine 710.
The communication connection with the controller 610 is configured to receive traffic prohibition information sent by the controller 610 and used for indicating that information verification is unsuccessful, where the traffic prohibition information includes the certificate information and the image information;
the controller 610 is further configured to:
if the pre-stored information does not have target image information matched with the image information or target certificate information matched with the certificate information, generating non-passing information for representing unsuccessful information verification;
sending the no-pass information to the duty machine 710;
and generating release information for representing the permission of the passage after receiving the passage permission instruction sent by the duty machine 710.
FIG. 8 is a block diagram illustrating a security management system in accordance with an exemplary embodiment. As shown in fig. 8, the system 600 further includes a display screen 810; namely, the system 600 includes: controller 610, credential reading device 620, camera 630, duty machine 710, display screen 810.
The display screen 810 is in communication connection with the controller 610 and is used for displaying visitor information and employee information, wherein the visitor information comprises the number of visitors, and the employee information comprises employee attendance information, employee attendance information and vehicle attendance information;
the controller 610 is further configured to: generating the visitor information and the employee information; sending the visitor information and the employee information to the display screen 810.
FIG. 9 is a schematic diagram illustrating a security management system in accordance with an exemplary embodiment. As shown in fig. 9, the system 600 includes: the system comprises a controller 610, a certificate reading device 620, a camera 6301 and 6304, a duty machine 710, display screens 8101 and 8102 and a database 820.
Optionally, the camera 6101 and the certificate reading device 620 are arranged in pairs at an entrance and an exit of a park, and are configured to collect the identity card information and/or the employee card information of the user when the user enters and exits the park, and if the user is an external visitor, other valid identity card information may be collected.
The cameras 6302, 6303 and 6304 are arranged inside the campus, for example, at the doorway of an administrative building and on both sides of the road of the campus, and are used for tracking the whereabouts of external visitors, so that the external visitors can enter places without permission to enter the campus, and warning information is sent out in time, and the security of the campus is improved.
The duty machine 710 may be a terminal electronic device, such as a tablet, a collection, etc., to allow security personnel to know visitor information about the import and export of the campus while patrolling in situ. For example, during holidays, fewer security personnel in the garden are required, and patrol duty is required, so that people may not always stand at the entrance and exit of the garden. The security management convenience of the garden can be improved.
Optionally, the display screen 8101 is provided in a security department or other department having authority to manage security of the campus, so that the department can know the number of visitors and clearly know the security state of the campus. Display screen 8102 can be the display screen of office computers such as leaders to managers in time know staff's the condition of attendance, the condition of going out etc. strengthen staff's management.
Alternatively, the database 820 may be used to store preset employee information, such as identification card information, employee card information, preset employee vehicle information, and information such as blacklists, grey lists, white lists, etc.
With regard to the system in the above-described embodiment, the specific manner in which each device performs the operations has been described in detail in the embodiment related to the method, and will not be elaborated upon here.
The preferred embodiments of the present disclosure are described in detail with reference to the accompanying drawings, however, the present disclosure is not limited to the specific details of the above embodiments, and various simple modifications may be made to the technical solution of the present disclosure within the technical idea of the present disclosure, and these simple modifications all belong to the protection scope of the present disclosure.
It should be noted that, in the foregoing embodiments, various features described in the above embodiments may be combined in any suitable manner, and in order to avoid unnecessary repetition, various combinations that are possible in the present disclosure are not described again.
In addition, any combination of various embodiments of the present disclosure may be made, and the same should be considered as the disclosure of the present disclosure, as long as it does not depart from the spirit of the present disclosure.

Claims (10)

1. A security management method is characterized by comprising the following steps:
acquiring image information and certificate information of a user;
judging whether pre-stored information contains target image information matched with the image information and target certificate information matched with the certificate information;
and if the pre-stored information contains target image information matched with the image information and target certificate information matched with the certificate information, generating release information for representing permission to pass.
2. The method according to claim 1, wherein the image information includes facial feature information and vehicle image information, and the document information includes identification card information and employee card information;
if the pre-stored information contains target image information matched with the image information and target certificate information matched with the certificate information, generating release information for representing permission to pass, including:
and if target image information matched with the facial feature information and/or the vehicle image information exists in the prestored information, and target certificate information matched with the identity card information and/or the employee card information exists in the prestored information, generating release information for representing permission to pass.
3. The method of claim 2, wherein the pre-stored information comprises reserved access information, wherein the reserved access information comprises reserved facial feature information uploaded by a user at a time of a reserved access, reserved vehicle image information, and reserved identity document information;
the method further comprises the following steps:
receiving the reserved visiting information of the user;
if the pre-stored information contains target image information matched with the image information and target certificate information matched with the certificate information, generating release information for representing permission to pass, including:
if the reserved facial feature information contains target image information matched with the facial feature information and the reserved identity document information contains target document information matched with the identity card information, generating release information for representing permission to pass;
alternatively, the first and second electrodes may be,
and if the reserved vehicle image information contains target image information matched with the vehicle image information and the reserved identity document information contains target document information matched with the identity card information, generating release information for representing permission to pass.
4. The method of claim 1, wherein the pre-stored information comprises a white list and a grey list, wherein the grey list indicates that the user is a visitor and is allowed to enter and exit, and the white list indicates that the user is an employee and is allowed to enter and exit;
if the pre-stored information contains target image information matched with the image information and target certificate information matched with the certificate information, generating release information for representing permission to pass, including:
if the white list has target image information matched with the image information and target certificate information matched with the certificate information, generating release information for representing permission;
alternatively, the first and second electrodes may be,
if the target image information matched with the image information exists in the grey list and the target certificate information matched with the certificate information exists, determining the access authority of the user;
and generating release information for representing permission to pass according to the access authority, and monitoring the whereabouts of the user after the user enters.
5. The method of claim 4, wherein the pre-stored information comprises a blacklist, wherein the blacklist characterizes users as prevention and control objects and does not allow access;
the method further comprises the following steps:
and if the blacklist has target image information matched with the image information and the acquisition time length and/or the acquisition frequency of the image information exceed a first preset threshold value in a first preset time period, sending an alarm prompt.
6. The method according to any one of claims 1-5, further comprising:
if the pre-stored information does not have target image information matched with the image information or target certificate information matched with the certificate information, generating and sending non-passing information for representing unsuccessful verification of information, wherein the non-passing information comprises the certificate information and the image information;
and generating releasing information for representing the permission after receiving the permission instruction.
7. The method of claim 6, further comprising:
according to the release information, visitor information and employee information are generated, wherein the visitor information comprises the number of visitors, and the employee information comprises employee attendance information, employee attendance information and vehicle attendance information;
and sending the visitor information and the employee information so as to display the visitor information and the employee information on corresponding user interfaces.
8. A security management system, the system comprising: the certificate reading device is in communication connection with the controller, and the camera is in communication connection with the controller;
the certificate reading equipment is used for collecting certificate information of a user, wherein the certificate information comprises identity card information and employee card information;
the camera is used for collecting image information, and the image information comprises facial feature information and vehicle image information;
the controller is configured to:
acquiring the image information and the certificate information;
judging whether pre-stored information contains target image information matched with the image information and target certificate information matched with the certificate information;
and if the pre-stored information contains target image information matched with the image information and target certificate information matched with the certificate information, generating release information for representing permission to pass.
9. The system of claim 8, further comprising a duty machine;
the attendance machine is in communication connection with the controller and is used for receiving traffic prohibition information which is sent by the controller and used for indicating that the information verification is unsuccessful, wherein the traffic prohibition information comprises the certificate information and the image information;
the controller is further configured to:
if the pre-stored information does not have target image information matched with the image information or target certificate information matched with the certificate information, generating non-passing information for representing unsuccessful information verification;
sending the no-pass information to the duty machine;
and generating release information for representing the permission of the passage after receiving the passage permission instruction sent by the duty machine.
10. The system of claim 8 or 9, further comprising a display screen;
the display screen is in communication connection with the controller and is used for displaying visitor information and employee information, wherein the visitor information comprises the number of visitors, and the employee information comprises employee attendance information, employee attendance information and vehicle attendance information;
the controller is further configured to:
generating the visitor information and the employee information;
and sending the visitor information and the employee information to the display screen.
CN201911376175.1A 2019-12-27 2019-12-27 Security management method and system Pending CN111145403A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911376175.1A CN111145403A (en) 2019-12-27 2019-12-27 Security management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911376175.1A CN111145403A (en) 2019-12-27 2019-12-27 Security management method and system

Publications (1)

Publication Number Publication Date
CN111145403A true CN111145403A (en) 2020-05-12

Family

ID=70520944

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911376175.1A Pending CN111145403A (en) 2019-12-27 2019-12-27 Security management method and system

Country Status (1)

Country Link
CN (1) CN111145403A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111429639A (en) * 2020-05-26 2020-07-17 桂林师范高等专科学校 Artificial intelligence access control system
CN113112665A (en) * 2021-03-22 2021-07-13 深兰盛视科技(苏州)有限公司 Access management method, device, electronic equipment and storage medium
CN113223224A (en) * 2021-05-12 2021-08-06 支付宝(杭州)信息技术有限公司 Traffic processing method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1280095A1 (en) * 2001-07-27 2003-01-29 Kabushiki Kaisha Toshiba Face image recognition apparatus
CN108022338A (en) * 2017-11-15 2018-05-11 安恩达科技(深圳)有限公司 The control method of access control system and access control system
CN108269336A (en) * 2018-01-18 2018-07-10 西安艾润物联网技术服务有限责任公司 A kind of vehicle and authorization management method of occupant, device and storage medium
CN109285260A (en) * 2018-11-14 2019-01-29 深圳市威富视界有限公司 A kind of gate control method and device
CN109727352A (en) * 2018-12-21 2019-05-07 广东粤众互联信息技术有限公司 A kind of campus method for early warning based on recognition of face
CN110070647A (en) * 2019-03-21 2019-07-30 深圳壹账通智能科技有限公司 A kind of intelligent community management method and device thereof based on recognition of face
CN110570551A (en) * 2019-08-01 2019-12-13 重庆远通电子技术开发有限公司 Intelligent security system and working method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1280095A1 (en) * 2001-07-27 2003-01-29 Kabushiki Kaisha Toshiba Face image recognition apparatus
CN108022338A (en) * 2017-11-15 2018-05-11 安恩达科技(深圳)有限公司 The control method of access control system and access control system
CN108269336A (en) * 2018-01-18 2018-07-10 西安艾润物联网技术服务有限责任公司 A kind of vehicle and authorization management method of occupant, device and storage medium
CN109285260A (en) * 2018-11-14 2019-01-29 深圳市威富视界有限公司 A kind of gate control method and device
CN109727352A (en) * 2018-12-21 2019-05-07 广东粤众互联信息技术有限公司 A kind of campus method for early warning based on recognition of face
CN110070647A (en) * 2019-03-21 2019-07-30 深圳壹账通智能科技有限公司 A kind of intelligent community management method and device thereof based on recognition of face
CN110570551A (en) * 2019-08-01 2019-12-13 重庆远通电子技术开发有限公司 Intelligent security system and working method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111429639A (en) * 2020-05-26 2020-07-17 桂林师范高等专科学校 Artificial intelligence access control system
CN113112665A (en) * 2021-03-22 2021-07-13 深兰盛视科技(苏州)有限公司 Access management method, device, electronic equipment and storage medium
CN113223224A (en) * 2021-05-12 2021-08-06 支付宝(杭州)信息技术有限公司 Traffic processing method and device
CN113223224B (en) * 2021-05-12 2023-10-24 支付宝(杭州)信息技术有限公司 Traffic processing method and device

Similar Documents

Publication Publication Date Title
US10503941B2 (en) Enhancements to meterless remote parking monitoring systems
JP6373874B2 (en) Parking meter and method for monitoring and managing parking
CN105355079B (en) Intelligent parking system
CN111145403A (en) Security management method and system
JP5658605B2 (en) Parking lot management system
CN111047718A (en) Urban rail transit security check ticket business fusion system
CN111882288A (en) Intelligent office system
CN111402459A (en) Intelligent access control system with community comprehensive management function and method thereof
CN112419568A (en) Intelligent traffic control system based on NB-IoT
KR102016089B1 (en) Parking Space Sharing System using Automatic Response System and Web-Based Visible Automatic Response System
TW201931316A (en) Management system of parking site and access control method for vehicles
CN109281527B (en) Management method, device and system of intelligent stereo garage
CN113129494A (en) Region management method and device based on face recognition and terminal equipment
CN115083053B (en) Intelligent community access control system and control method
CN115983527A (en) Big data management system based on Internet of things
CN111063072B (en) Information sharing type access control system
KR20030087313A (en) Manless parking control system method thereof
TWM560675U (en) Apparatus for displaying information about parking site, and management system thereof
CN110136473B (en) Property community visitor vehicle intelligent management method and system
CN111144199A (en) Parking lot parking space management method and device and storage medium
CN112785732A (en) Parking lot safety management method and system
AU2018271308B2 (en) Enhancements to meterless remote parking monitoring systems
CN116403322A (en) Access control method and system
KR20230141328A (en) Illegal parking enforcement advance notification system
AU2014268221B2 (en) Enhancements to meterless remote parking monitoring systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200512