CN111429638A - Access control method based on voice recognition and face recognition - Google Patents

Access control method based on voice recognition and face recognition Download PDF

Info

Publication number
CN111429638A
CN111429638A CN202010285816.9A CN202010285816A CN111429638A CN 111429638 A CN111429638 A CN 111429638A CN 202010285816 A CN202010285816 A CN 202010285816A CN 111429638 A CN111429638 A CN 111429638A
Authority
CN
China
Prior art keywords
face image
target
background server
entrance guard
access control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010285816.9A
Other languages
Chinese (zh)
Other versions
CN111429638B (en
Inventor
汪辽宁
岳培培
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Jiangji Intelligent Technology Co ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010285816.9A priority Critical patent/CN111429638B/en
Publication of CN111429638A publication Critical patent/CN111429638A/en
Application granted granted Critical
Publication of CN111429638B publication Critical patent/CN111429638B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Collating Specific Patterns (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention relates to an access control method based on voice recognition and face recognition, wherein the access control equipment works by acquiring a voice signal and a face image of a recognized person and sending the voice signal and the face image to a background server, and the background server works by: the method comprises the steps of carrying out voiceprint recognition on a voice signal to obtain a target voiceprint, obtaining a face image corresponding to the target voiceprint by combining an identity database and a face image database, then comparing the face image with the obtained face image by a background server, and if the two face images are matched, sending an entrance guard opening instruction to entrance guard equipment by the background server. The access control method is controlled by the background server, and the background server can increase the control reliability and safety by processing a series of data.

Description

Access control method based on voice recognition and face recognition
Technical Field
The invention relates to an access control method based on voice recognition and face recognition.
Background
With the development of society and technology, the conventional door lock has failed to satisfy the requirements for safety and convenience. Based on this, access control system is coming, and access control system develops on traditional lock basis. For private houses, offices, banks and other places, the access control system is an effective measure for realizing safety precaution management. At present, access control system adopts the mode of password unblock mostly, to the user, only need remember the password of entrance guard can, solved the problem that traditional lock need hand-carry the key like this, brought very big convenience for the user. Under the condition that the number of people is more in offices and the like, in order to guarantee the security and prevent the password from revealing, the access control system adopts the mode of fingerprint unblock. Because the fingerprint is unique for each person, fingerprint unlocking is only effective for specific persons, which further improves the security of the access control system. In order to promote the intelligent degree of access control system, the access control system based on speech recognition is more and more concerned about, and the current access control system based on speech recognition's control mode is usually: and carrying out voice recognition on the collected voice signals, and controlling the access control system according to a voice recognition result. Although this control method can realize voice control to a certain extent, it is relatively simple and has relatively single control conditions, and therefore, the safety is poor.
Disclosure of Invention
The invention aims to provide an access control method based on voice recognition and face recognition, which is used for solving the problem of poor safety of the control mode of the existing access control system based on voice recognition.
In order to solve the problems, the invention adopts the following technical scheme:
an entrance guard control method based on voice recognition and face recognition comprises the following steps:
the method comprises the steps that an access control device obtains a voice signal of a recognized person and a face image of the recognized person;
the entrance guard equipment sends the voice signal and the face image to a background server;
the background server performs voiceprint recognition on the voice signal to obtain a target voiceprint;
the background server stores an identity database, inputs the target voiceprint into the identity database and obtains target identity information corresponding to the target voiceprint; the identity database comprises at least two different voiceprints and identity information corresponding to the voiceprints;
a face image database is stored in the background server, and the background server inputs the target identity information into the face image database to obtain a target face image corresponding to the target identity information; the face image database comprises at least two different identity information and face images corresponding to the identity information;
the background server compares the face image of the identified person with the target face image to obtain whether the face image of the identified person is matched with the target face image;
if the face image of the identified person is matched with the target face image, the background server sends an entrance guard opening instruction to the entrance guard equipment;
the entrance guard equipment is controlled by the entrance guard opening instruction to be opened.
Optionally, the access control method based on voice recognition and face recognition further includes:
if the background server inputs the target voiceprint into the identity database and target identity information corresponding to the target voiceprint is not obtained, the background server sends the face image of the identified person to the owner terminal equipment according to a preset communication address of the owner terminal equipment;
correspondingly, if the background server receives the entrance guard opening instruction sent by the owner terminal equipment, the entrance guard opening instruction is sent to the entrance guard equipment.
Optionally, the facial images of the identified persons comprise continuously acquired continuous shooting facial images of at least two identified persons;
before the background server compares the face image of the identified person with the target face image, the access control method based on voice recognition and face recognition further comprises the following steps:
acquiring first matching degrees between every two continuously shot face images of the identified person, and if each first matching degree is greater than or equal to a first preset matching degree threshold value, executing the step of comparing the face image of the identified person with the target face image by the background server;
correspondingly, the step of comparing the face image of the identified person with the target face image by the background server to obtain whether the face image of the identified person is matched with the target face image includes:
the background server sequentially compares the continuously shot face image of each identified person with the target face image to respectively obtain corresponding second matching degrees;
judging whether the face image of the identified person is matched with the target face image or not according to the size relation between each second matching degree and a second preset matching degree threshold value;
correspondingly, if the face image of the identified person is matched with the target face image, the background server sends an entrance guard opening instruction to the entrance guard device, and the entrance guard opening instruction comprises the following steps:
and if all the second matching degrees are greater than or equal to the second preset matching degree threshold value, the background server sends the entrance guard opening instruction to the entrance guard equipment.
Optionally, the comparing, by the background server, the continuously shot face image of each identified person with the target face image in sequence to obtain corresponding second matching degrees, respectively, includes:
marking feature coordinates of each key feature in the continuously shot face image of each identified person and the target face image based on a preset face key feature list;
calculating a characteristic distance value between the characteristic coordinates of each key characteristic of the continuous shooting face image and the characteristic coordinates of each corresponding key characteristic in the target face image for the continuous shooting face image of any identified person; calculating to obtain a target average value of the characteristic distance values; obtaining a second matching degree corresponding to the target average value according to a corresponding relation between a preset average value and the second matching degree; the preset corresponding relation between the average value and the second matching degree comprises at least two average value intervals and the second matching degree corresponding to each average value interval, and the average value intervals and the second matching degrees are in an anti-correlation relation.
The invention has the beneficial effects that: the access control equipment and the background server jointly realize the control of the access control, wherein the access control equipment is only used for collecting the voice signal of the identified person and the face image of the identified person, the access control equipment sends the voice signal and the face image of the identified person to the background server, the background server processes the received data information and finally outputs a corresponding access control instruction to the access control equipment, so that the control strategy and the data related to the control strategy in the background server cannot be lost even if the access control equipment fails, and the control strategy and the data related to the control strategy in the background server do not need to be modified even if the access control equipment is replaced, thereby improving the control reliability and the safety, and as the access control equipment does not have the control strategy and the data related to the control strategy, even if an illegal person operates the access control equipment randomly, the control strategy and the data related to the control strategy cannot be modified, so that the access control cannot be opened in a data tampering mode, and the access control safety is improved; the background server carries out voiceprint recognition on the voice signal to obtain a target voiceprint, finally obtains a prestored face image according to the target voiceprint, the identity database and the face image database, and compared with an existing control mode, the access control system has the advantages that the control reliability and the safety are increased by carrying out a series of comparison processing according to the fact that the prestored face image is matched with two face images or not through comparing the prestored face image and the actually acquired face image.
Drawings
In order to more clearly illustrate the technical solution of the embodiment of the present invention, the drawings needed to be used in the embodiment will be briefly described as follows:
fig. 1 is a schematic diagram of communication between an access control device and a backend server;
fig. 2 is a flow chart of an access control method based on voice recognition and face recognition.
Detailed Description
The embodiment provides an access control method based on voice recognition and face recognition, which is implemented by access control equipment and a background server.
The access control method provided by the embodiment is not only applicable to a unique application scene, and can be applied to a house door, and also can be applied to a factory door or an office door in an enterprise. The present embodiment takes a home door as an example. The access control equipment is conventional home door access control. Because voice signals and face images need to be acquired, the access control device needs to be provided with voice acquisition devices and image acquisition devices, wherein the voice acquisition devices take microphones as examples, and the image acquisition devices take cameras as examples. Microphone and camera setting are at home door, and set up the position and use convenient collection as the standard, set up the average height that highly can equal ordinary people, for example 1.7 m.
As shown in fig. 1, the access control device is connected with the background server in a wired communication manner or in a wireless communication manner. If the access control equipment is in wireless communication connection with the background server, the access control equipment needs to be provided with a power supply, a processor and a wireless communication module, and the power supply supplies power to the wireless communication module, the processor, the microphone and the camera. As a specific embodiment, an electrical box may be specially provided at the inner side of the home door, and the power supply, the processor and the wireless communication module are provided in the electrical box.
The setting position of the background server is determined by the application scenario, if the application is in a home, the background server may be set somewhere in the home, for example: a multimedia line concentrator; if the method is applied to enterprises, the background server can be arranged in a background monitoring center of the enterprises. Of course, the backend server may also be a cloud server.
Because entrance guard's equipment sets up in family department, and backend server sets up somewhere at the family, so, entrance guard's equipment and backend server set up in different positions.
As shown in fig. 2, the access control method based on voice recognition and face recognition provided in this embodiment includes the following steps:
the entrance guard equipment obtains the speech signal of the identified person and the face image of the identified person:
when a person who needs to enter the home is standing at the home, the person is an identified person. The recognized person needs to send out a certain voice signal, in order to obtain the voiceprint of the voice signal (i.e. to identify the identity), the voice signal may be a specific sentence, and each recognized person speaks the same voice signal when performing identity recognition, for example: the sentence "please identify identity".
The identified person speaks 'please identify the identity', a microphone of the access control equipment acquires a voice signal, and a camera acquires a face image of the identified person.
The access control equipment sends the voice signal and the face image to a background server:
and the access control equipment sends the acquired voice signal and the acquired face image of the identified person to the background server in a wired communication mode or a wireless communication mode.
The background server performs voiceprint recognition on the voice signal to obtain a target voiceprint:
and after receiving the voice signal and the face image of the identified person, the background server performs voiceprint identification on the voice signal to obtain a target voiceprint of the identified person. Since the voiceprint recognition is performed on the voice signal to obtain the voiceprint characteristics, which belongs to the conventional technology, the prior art has a mature application, for example, the method for recognizing the voiceprint is provided in the chinese patent with the publication number of CN107610708B, and the description of this embodiment is omitted.
The background server stores an identity database, inputs the target voiceprint into the identity database and obtains target identity information corresponding to the target voiceprint; wherein, the identity database comprises at least two different voiceprints and identity information corresponding to each voiceprint:
the background server is provided with a storage module, an identity database is stored in the storage module, and the identity database comprises at least two different voiceprints and identity information corresponding to the voiceprints. The number of voiceprints in the identity database is set according to actual needs, for example, the number of voiceprints is the number of family members, and each voiceprint in the identity database is the voiceprint of a family member. The identity information corresponding to each voiceprint may be name information of each family member, or may be identity code information, where each identity code information corresponds to one family member, such as 001 and 002. It should be understood that each voiceprint in the identity database and the corresponding identity information are all previously entered into the background server, and each voiceprint in the identity database and the corresponding identity information can be adjusted according to actual needs.
And the background server inputs the acquired target voiceprint into an identity database, and compares the acquired target voiceprint with each voiceprint in the identity database to find identity information corresponding to the target voiceprint, wherein the identity information is the target identity information.
Further, the background server stores a communication address, which is a preset communication address of the owner terminal device (such as a smart phone), and the background server can communicate with the owner terminal device through the communication address. Correspondingly, the access control method further comprises the following processes: if the background server inputs the target voiceprint into the identity database and target identity information corresponding to the target voiceprint is not obtained, namely the identified person is not a family member and belongs to an alien person, the background server sends the collected face image of the identified person to the owner terminal equipment according to a preset communication address of the owner terminal equipment, the owner autonomously determines whether the identified person enters the house or not, and the owner sends a corresponding control instruction to the background server through the owner terminal equipment. Correspondingly, if the background server receives the entrance guard opening instruction sent by the owner terminal equipment, the background server sends the entrance guard opening instruction to the entrance guard equipment to control entrance guard opening.
A face image database is stored in the background server, and the background server inputs the target identity information into the face image database to obtain a target face image corresponding to the target identity information; the face image database comprises at least two different identity information and face images corresponding to the identity information:
the storage module of the background server also stores a face image database, and the face image database comprises at least two different identity information and face images corresponding to the identity information. The number of the identity information may be equal to the number of the family members, that is, each identity information is the identity information of each family member, and accordingly, the face image corresponding to each identity information is the face image of each family member. Each facial image is collected in advance, and in order to improve the recognition reliability, each facial image in the facial image database is a front facial image, such as: a picture of the face in a one inch photograph or a two inch photograph of each family member.
And the background server inputs the obtained target identity information into a face image database, and the target face image corresponding to the target identity information is found by comparing the target identity information with each identity information in the face image database.
The background server compares the face image of the identified person with the target face image to obtain whether the face image of the identified person is matched with the target face image:
the background server compares the actually acquired face image of the identified person with the target face image acquired from the face image database, and judges whether the actually acquired face image of the identified person is matched with the target face image acquired from the face image database, wherein matching means that the two face images are the same face image, and mismatching means that the two face images are not the same face image. Specifically, the method comprises the following steps: and obtaining the matching degree, namely the similarity, of the two face images through comparison, judging that the two face images are matched if the matching degree is greater than or equal to a correlation threshold, and judging that the two face images are not matched if the matching degree is less than the correlation threshold.
As a specific embodiment, in order to improve the recognition reliability, the camera continuously photographs the face images of the recognized person, that is, the face images of the recognized person acquired by the camera include continuously photographed face images of at least two recognized persons, and the specific number is set according to actual needs.
Then, before the background server compares the face image of the identified person with the target face image, the access control method further includes the following steps: acquiring a first matching degree between every two continuous shooting face images (the calculation process of the first matching degree can adopt a calculation process of a second matching degree given below and can also adopt other calculation processes in the prior art), and then obtaining a total first matching degree for n continuous shooting face images, and if each first matching degree is greater than or equal to a first preset matching degree threshold value, namely, no large difference exists between any two continuous shooting face images, the acquired continuous shooting face images are face images of the same person, and then executing the subsequent step of comparing the face images of the identified person with the target face images by a background server.
Correspondingly, the background server compares the actually collected face image of the identified person with the target face image obtained from the face image database to obtain whether the two face images are matched, specifically:
(1) and the background server compares each continuously shot face image with the target face image in sequence to respectively obtain corresponding second matching degrees. The background server compares the first continuous shooting face image with the target face image to obtain a second matching degree, then compares the second continuous shooting face image with the target face image to obtain a second matching degree, then compares the third continuous shooting face image with the target face image to obtain a second matching degree, and so on, compares the last continuous shooting face image with the target face image to obtain a second matching degree.
Wherein, for the background server comparing the continuous shooting face image of each identified person with the target face image in sequence to obtain corresponding second matching degrees respectively, a specific implementation process is given as follows, including:
i) and marking the feature coordinates of each key feature in each continuous shooting face image and the target face image based on a preset face key feature list. The face key feature list may include: the four human face features of the eyes, the ears, the mouth and the nose can also comprise eyebrows, forehead and the like, and the specifically contained human face features can be correspondingly configured according to actual needs, such as different control strictness degrees required. The background server marks each key feature in each continuous shooting face image and the target face image according to a preset face key feature list, and obtains corresponding feature coordinates according to the coordinates of each key feature in the images;
ii) calculating a characteristic distance value between the characteristic coordinate of each key characteristic of the continuous shooting face image and the characteristic coordinate of each corresponding key characteristic in the target face image for the continuous shooting face image of any identified person, wherein the characteristic distance value of the two characteristic coordinates can be calculated through coordinate distance calculation formulas such as a Euclidean distance calculation formula; calculating to obtain an average value of the characteristic distance values according to the obtained characteristic distance values, wherein the average value is a target average value; a corresponding relationship between the average value and the second matching degree is preset, where the corresponding relationship includes at least two average value intervals and the second matching degree corresponding to each average value interval, and the average value interval and the second matching degree are in an inverse correlation relationship, that is, a lower average value interval indicates that the distance between each key feature in the two images is smaller, indicating that the two images are more similar, and a corresponding second matching degree is higher, for example: the corresponding relationship includes two average value intervals, which are [ x1, x2], (x 2, x3], where the second matching degree corresponding to [ x1, x2] is y1, (x 2, x 3) corresponds to y2, x1 < x2 < x3, y1 > y2., and the specific value of the average value interval and the specific value of the second matching degree are set according to actual requirements.
(2) And judging whether the face image of the identified person which is actually acquired is matched with the target face image obtained by the face image database or not according to the size relation between each second matching degree and a second preset matching degree threshold value, wherein if all the second matching degrees are greater than or equal to the second preset matching degree threshold value, the two face images are judged to be matched, and otherwise, if at least one second matching degree is smaller than the second preset matching degree threshold value, the two face images are judged to be not matched.
The above-mentioned concrete image matching process that has given, the implementation of this process can increase discernment strict degree, and then can promote entrance guard's control's security.
If the face image of the identified person is matched with the target face image, the background server sends an entrance guard opening instruction to the entrance guard equipment:
and if the face image of the identified person is matched with the target face image, namely all the second matching degrees are greater than or equal to a second preset matching degree threshold value, the background server sends an entrance guard opening instruction to the entrance guard equipment.
The entrance guard equipment is in open under the control of entrance guard opening instruction:
the entrance guard equipment receives entrance guard's opening instruction, and under this entrance guard's control command's control, entrance guard's equipment is opened, and the family door is opened.
The above-mentioned embodiments are merely illustrative of the technical solutions of the present invention in a specific embodiment, and any equivalent substitutions and modifications or partial substitutions of the present invention without departing from the spirit and scope of the present invention should be covered by the claims of the present invention.

Claims (4)

1. The access control method based on voice recognition and face recognition is characterized by comprising the following steps of:
the method comprises the steps that an access control device obtains a voice signal of a recognized person and a face image of the recognized person;
the entrance guard equipment sends the voice signal and the face image to a background server;
the background server performs voiceprint recognition on the voice signal to obtain a target voiceprint;
the background server stores an identity database, inputs the target voiceprint into the identity database and obtains target identity information corresponding to the target voiceprint; the identity database comprises at least two different voiceprints and identity information corresponding to the voiceprints;
a face image database is stored in the background server, and the background server inputs the target identity information into the face image database to obtain a target face image corresponding to the target identity information; the face image database comprises at least two different identity information and face images corresponding to the identity information;
the background server compares the face image of the identified person with the target face image to obtain whether the face image of the identified person is matched with the target face image;
if the face image of the identified person is matched with the target face image, the background server sends an entrance guard opening instruction to the entrance guard equipment;
the entrance guard equipment is controlled by the entrance guard opening instruction to be opened.
2. The door access control method based on voice recognition and face recognition of claim 1, wherein the door access control method based on voice recognition and face recognition further comprises:
if the background server inputs the target voiceprint into the identity database and target identity information corresponding to the target voiceprint is not obtained, the background server sends the face image of the identified person to the owner terminal equipment according to a preset communication address of the owner terminal equipment;
correspondingly, if the background server receives the entrance guard opening instruction sent by the owner terminal equipment, the entrance guard opening instruction is sent to the entrance guard equipment.
3. The access control method based on voice recognition and face recognition according to claim 1, wherein the face images of the recognized persons comprise continuously acquired continuous-shot face images of at least two recognized persons;
before the background server compares the face image of the identified person with the target face image, the access control method based on voice recognition and face recognition further comprises the following steps:
acquiring first matching degrees between every two continuously shot face images of the identified person, and if each first matching degree is greater than or equal to a first preset matching degree threshold value, executing the step of comparing the face image of the identified person with the target face image by the background server;
correspondingly, the step of comparing the face image of the identified person with the target face image by the background server to obtain whether the face image of the identified person is matched with the target face image includes:
the background server sequentially compares the continuously shot face image of each identified person with the target face image to respectively obtain corresponding second matching degrees;
judging whether the face image of the identified person is matched with the target face image or not according to the size relation between each second matching degree and a second preset matching degree threshold value;
correspondingly, if the face image of the identified person is matched with the target face image, the background server sends an entrance guard opening instruction to the entrance guard device, and the entrance guard opening instruction comprises the following steps:
and if all the second matching degrees are greater than or equal to the second preset matching degree threshold value, the background server sends the entrance guard opening instruction to the entrance guard equipment.
4. The access control method based on voice recognition and face recognition according to claim 3, wherein the background server sequentially compares the continuously shot face image of each recognized person with the target face image to obtain corresponding second matching degrees, respectively, and comprises:
marking feature coordinates of each key feature in the continuously shot face image of each identified person and the target face image based on a preset face key feature list;
calculating a characteristic distance value between the characteristic coordinates of each key characteristic of the continuous shooting face image and the characteristic coordinates of each corresponding key characteristic in the target face image for the continuous shooting face image of any identified person; calculating to obtain a target average value of the characteristic distance values; obtaining a second matching degree corresponding to the target average value according to a corresponding relation between a preset average value and the second matching degree; the preset corresponding relation between the average value and the second matching degree comprises at least two average value intervals and the second matching degree corresponding to each average value interval, and the average value intervals and the second matching degrees are in an anti-correlation relation.
CN202010285816.9A 2020-04-13 2020-04-13 Access control method based on voice recognition and face recognition Expired - Fee Related CN111429638B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010285816.9A CN111429638B (en) 2020-04-13 2020-04-13 Access control method based on voice recognition and face recognition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010285816.9A CN111429638B (en) 2020-04-13 2020-04-13 Access control method based on voice recognition and face recognition

Publications (2)

Publication Number Publication Date
CN111429638A true CN111429638A (en) 2020-07-17
CN111429638B CN111429638B (en) 2021-10-26

Family

ID=71554128

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010285816.9A Expired - Fee Related CN111429638B (en) 2020-04-13 2020-04-13 Access control method based on voice recognition and face recognition

Country Status (1)

Country Link
CN (1) CN111429638B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111931484A (en) * 2020-07-31 2020-11-13 于梦丽 Data transmission method based on big data
CN111951450A (en) * 2020-08-20 2020-11-17 北京云中融信网络科技有限公司 Access control method and device of intelligent security door, electronic equipment and storage medium
CN113538760A (en) * 2021-07-13 2021-10-22 广东金鸿星智能科技有限公司 Access control host based on voice recognition and access control method thereof

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100893905B1 (en) * 2008-07-07 2009-04-21 주식회사 미래인식 Method and system for managing entrance using biometrics
CN104598795A (en) * 2015-01-30 2015-05-06 科大讯飞股份有限公司 Authentication method and system
CN104809782A (en) * 2015-04-24 2015-07-29 成都腾悦科技有限公司 Access control system based on voice recognition and face recognition
CN107633209A (en) * 2017-08-17 2018-01-26 平安科技(深圳)有限公司 Electronic installation, the method and storage medium of dynamic video recognition of face
CN107680221A (en) * 2017-09-30 2018-02-09 深圳前海弘稼科技有限公司 Door opening method and device, entrance guard device and computer-readable recording medium
CN108416273A (en) * 2018-02-09 2018-08-17 厦门通灵信息科技有限公司 A kind of Distributive System of Face Recognition and its recognition methods
US20190065833A1 (en) * 2017-08-30 2019-02-28 Qualcomm Incorporated Detecting false positives in face recognition
CN110276243A (en) * 2019-05-07 2019-09-24 平安科技(深圳)有限公司 Score mapping method, face comparison method, device, equipment and storage medium
CN110300086A (en) * 2018-03-22 2019-10-01 北京语智科技有限公司 Personal identification method, device, system and equipment
CN110472491A (en) * 2019-07-05 2019-11-19 深圳壹账通智能科技有限公司 Abnormal face detecting method, abnormality recognition method, device, equipment and medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100893905B1 (en) * 2008-07-07 2009-04-21 주식회사 미래인식 Method and system for managing entrance using biometrics
CN104598795A (en) * 2015-01-30 2015-05-06 科大讯飞股份有限公司 Authentication method and system
CN104809782A (en) * 2015-04-24 2015-07-29 成都腾悦科技有限公司 Access control system based on voice recognition and face recognition
CN107633209A (en) * 2017-08-17 2018-01-26 平安科技(深圳)有限公司 Electronic installation, the method and storage medium of dynamic video recognition of face
US20190065833A1 (en) * 2017-08-30 2019-02-28 Qualcomm Incorporated Detecting false positives in face recognition
CN107680221A (en) * 2017-09-30 2018-02-09 深圳前海弘稼科技有限公司 Door opening method and device, entrance guard device and computer-readable recording medium
CN108416273A (en) * 2018-02-09 2018-08-17 厦门通灵信息科技有限公司 A kind of Distributive System of Face Recognition and its recognition methods
CN110300086A (en) * 2018-03-22 2019-10-01 北京语智科技有限公司 Personal identification method, device, system and equipment
CN110276243A (en) * 2019-05-07 2019-09-24 平安科技(深圳)有限公司 Score mapping method, face comparison method, device, equipment and storage medium
CN110472491A (en) * 2019-07-05 2019-11-19 深圳壹账通智能科技有限公司 Abnormal face detecting method, abnormality recognition method, device, equipment and medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111931484A (en) * 2020-07-31 2020-11-13 于梦丽 Data transmission method based on big data
CN111951450A (en) * 2020-08-20 2020-11-17 北京云中融信网络科技有限公司 Access control method and device of intelligent security door, electronic equipment and storage medium
CN113538760A (en) * 2021-07-13 2021-10-22 广东金鸿星智能科技有限公司 Access control host based on voice recognition and access control method thereof

Also Published As

Publication number Publication date
CN111429638B (en) 2021-10-26

Similar Documents

Publication Publication Date Title
CN111429638B (en) Access control method based on voice recognition and face recognition
KR102350507B1 (en) Access control method, access control device, system and storage medium
CN206515931U (en) A kind of face identification system
CN106204815A (en) A kind of gate control system based on human face detection and recognition
CN105427421A (en) Entrance guard control method based on face recognition
WO2014139415A1 (en) Smart door/window anti-intrusion apparatus and system and smart access control system
US11776308B2 (en) Frictionless access control system embodying satellite cameras for facial recognition
CN106504374A (en) A kind of can automatic identification entrance guard security system
CN109118617A (en) A kind of access control system and its recognition methods applied to substation
CN111429639A (en) Artificial intelligence access control system
KR20160072386A (en) Home network system using face recognition based features and method using the same
CN110555918A (en) Attendance management method and attendance management equipment
CN106981119A (en) Entrance guard management system and method based on body shape
CN111862413A (en) Method and system for realizing epidemic situation resistant non-contact multidimensional identity rapid identification
CN113003330A (en) Intelligent elevator control method and system based on face recognition
CN109522782A (en) Household member&#39;s identifying system
CN114049718A (en) Access control system based on face recognition
CN108986288A (en) A kind of two-door access control system of the laboratory based on recognition of face and speech recognition
CN109272616A (en) A kind of entrance guard controlling method and system based on recognition of face
CN206788947U (en) Access control system based on body shape
CN212160789U (en) Face recognition access control system based on raspberry group
CN113158931A (en) Low-voltage centralized reading, operation and maintenance implementation method based on AI intelligent face recognition technology
CN113192251B (en) Method for realizing identity recognition of multiple biological characteristics capable of being configured on line
CN212933546U (en) Identity recognition system for computer equipment
CN113129497A (en) Intelligent access control system of data center machine room

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Zhang Xiaoping

Inventor after: Wang Liaoning

Inventor after: Yue Peipei

Inventor before: Wang Liaoning

Inventor before: Yue Peipei

GR01 Patent grant
GR01 Patent grant
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20211012

Address after: 400,000 Fengsheng Road, Jiulongpo District, Chongqing

Applicant after: Chongqing Jiangji Intelligent Technology Co.,Ltd.

Address before: No. 36 North Ring Road, Jinshui District, Zhengzhou City, Henan Province, Henan

Applicant before: Wang Liaoning

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20211026