CN111554025A - Passing method, device and system - Google Patents

Passing method, device and system Download PDF

Info

Publication number
CN111554025A
CN111554025A CN202010340225.7A CN202010340225A CN111554025A CN 111554025 A CN111554025 A CN 111554025A CN 202010340225 A CN202010340225 A CN 202010340225A CN 111554025 A CN111554025 A CN 111554025A
Authority
CN
China
Prior art keywords
face image
user
image information
information
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010340225.7A
Other languages
Chinese (zh)
Inventor
李旭滨
杨兴云
徐强辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Unisound Intelligent Technology Co Ltd
Xiamen Yunzhixin Intelligent Technology Co Ltd
Original Assignee
Unisound Intelligent Technology Co Ltd
Xiamen Yunzhixin Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Unisound Intelligent Technology Co Ltd, Xiamen Yunzhixin Intelligent Technology Co Ltd filed Critical Unisound Intelligent Technology Co Ltd
Priority to CN202010340225.7A priority Critical patent/CN111554025A/en
Publication of CN111554025A publication Critical patent/CN111554025A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention provides a passing method, a device and a system, wherein the method comprises the following steps: acquiring face image information located in a preset range of access control equipment; if the face image information is detected not to be matched with the verified face image information and a pass request is received, determining a responsive terminal of the pass request; the passing request carries the face image information and a user identifier of a target access user; sending the face image information to a responsive terminal corresponding to the user identification so that a target user can send response information of the passing request through the responsive terminal; if the response information indicates that the passage is allowed, generating the passage instruction so as to control the unlocking of the access control equipment; and if the response information shows that the passage is forbidden, generating the passage forbidding instruction so as to forbid the unlocking of the access control equipment. By adopting the technical scheme of the invention, the traffic convenience and safety can be improved.

Description

Passing method, device and system
Technical Field
The invention relates to the technical field of intelligent equipment, in particular to a passing method, equipment and a system.
Background
Entrance guard's equipment is the important equipment to novel modernization safety control such as district, under the general condition, sets up the entrance guard lock in the entrance guard's equipment, and the user can unblank through modes such as entrance guard's card, password, realizes current, and the visitor then needs input user's house number after, the user takes up the intercom and the visitor converses to when allowing the visitor current, the user manually presses the key of unlocking, opens the back with the entrance guard lock, realizes visitor's current.
However, since the intercom needs to be fixed at the entrance of the room of the user, after the passage request of the visitor is received, the user needs to reach the entrance of the room and pick up the intercom to carry out the conversation, and confirm whether the visitor is allowed to pass. When the user is inconvenient to answer, the visitor can only pass through the communication system after waiting for a long time, and in addition, for the user, the identity of the visitor cannot be accurately judged through sound, so that the safety of the user can be possibly damaged.
Therefore, how to improve the convenience and safety of traffic is a technical problem that those skilled in the art need to solve urgently.
Disclosure of Invention
In view of the above, the present invention is directed to a method, an apparatus and a system for passing through.
Based on the above purpose, the present invention provides a passing method, comprising:
acquiring face image information located in a preset range of access control equipment;
if the face image information is detected not to be matched with the verified face image information and a pass request is received, determining a responsive terminal of the pass request; the passing request carries the face image information and a user identifier of a target access user;
sending the face image information to a responsive terminal corresponding to the user identification so that a target user can send response information of the passing request through the responsive terminal;
if the response information indicates that the passage is allowed, generating the passage instruction so as to control the unlocking of the access control equipment;
and if the response information shows that the passage is forbidden, generating the passage forbidding instruction so as to forbid the unlocking of the access control equipment.
Further, in the passing method, the response information is generated by the user manually operating the response-enabled terminal, or the response information is generated by the user controlling the response-enabled terminal through voice, or the response information is generated by the user controlling the response-enabled terminal through body state information.
Further, the passing method further includes:
and storing the facial image information so as to inquire the facial image information.
Further, in the above traffic method, the face image information includes a face image and an image annotation;
the storing the face image information includes:
detecting whether stored images in stored image information contain the face images or not;
if the stored image comprises the face image, performing overlay updating on the stored image by using the face image, and keeping the image annotation;
and if the stored image comprises the image, performing insertion updating on the stored image by using the face image and the image annotation.
Further, in the above passing method, the detecting whether the face image information carried in the passing request matches with preset verification face image information includes:
if the face image is matched with a preset verification face image and the image annotation is matched with the preset verification image annotation, detecting that the face image information is matched with the verification face image information;
and if the face image is not matched with a preset verification face image and/or the image annotation is not matched with the preset verification image annotation, detecting that the face image information is not matched with the verification face image information.
Further, in the above-mentioned passing method, the determining a terminal that can respond to the passing request further includes:
if the user identification is detected to correspond to the only preset response terminal, determining the preset response terminal as the response-capable terminal;
if the user identification is detected to correspond to a plurality of preset response terminals, determining the distance between the user and each preset response terminal;
and selecting a preset response terminal with the minimum distance as the response terminal.
Further, in the above passing method, the determining a distance between the user and each of the preset response terminals includes:
determining the distance between the user and each preset response terminal through radar signals; and/or
And determining the distance between the user and each preset response terminal according to the user position information and the space information of each preset response terminal.
Further, the passing method further includes:
and if the face image information is detected to be matched with the verified face image information, generating the passing instruction so as to control the unlocking of the access control equipment.
The invention also provides a traffic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, which when executed by the processor implements the method of any one of claims 1 to 7.
The invention also provides a passing system which is characterized by comprising entrance guard equipment, at least one response terminal associated with each user identification and the passing equipment;
the access control equipment is used for acquiring face image information within a preset range;
the traffic device is used for implementing the method as described in any one of the above.
The passing method, the passing device and the passing system provided by the invention have the advantages that the face image information in the preset range of the access control device is obtained; if the face image information is detected to be not matched with the verified face image information and a pass request is received, determining a responsive terminal of the pass request, automatically matching the responsive terminal convenient for a user to use, and after the responsive terminal of the pass request is determined, sending the pass request carrying the face image information to the responsive terminal corresponding to the user identifier so that the target user can conveniently and quickly acquire the identity information of the visitor through the responsive terminal and send the response information of the pass request; if the response information indicates that the passage is allowed, generating a passage instruction so as to control the unlocking of the access control equipment; and if the response information shows that the passage is forbidden, generating a passage forbidding instruction so as to forbid the unlocking of the access control equipment. By adopting the technical scheme of the invention, the traffic convenience and safety can be improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow chart of an embodiment of the present invention;
FIG. 2 is a schematic structural diagram of a first embodiment of a traffic device according to the present invention;
FIG. 3 is a schematic structural diagram of a second embodiment of the passing device according to the present invention;
FIG. 4 is a schematic structural diagram of an embodiment of the passing device of the present invention;
fig. 5 is a schematic structural diagram of an embodiment of the traffic system of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to specific embodiments and the accompanying drawings.
It is to be noted that technical terms or scientific terms used in the embodiments of the present invention should have the ordinary meanings as understood by those having ordinary skill in the art to which the present disclosure belongs, unless otherwise defined. The use of "first," "second," and similar terms in this disclosure is not intended to indicate any order, quantity, or importance, but rather is used to distinguish one element from another. The word "comprising" or "comprises", and the like, means that the element or item listed before the word covers the element or item listed after the word and its equivalents, but does not exclude other elements or items. The terms "connected" or "coupled" and the like are not restricted to physical or mechanical connections, but may include electrical connections, whether direct or indirect. "upper", "lower", "left", "right", and the like are used merely to indicate relative positional relationships, and when the absolute position of the object being described is changed, the relative positional relationships may also be changed accordingly.
Fig. 1 is a flowchart of an embodiment of a passing method of the present invention, and as shown in fig. 1, the passing method of the embodiment may specifically include the following steps:
100. acquiring face image information located in a preset range of access control equipment;
in a concrete implementation process, in order to protect the safety of a user and facilitate the non-inductive passing of the user, the camera can be arranged on the door or around the door, so that when the face image of the user is collected, the access control equipment is opened, and when the face image information of a visitor is collected, the identity of the user or the visitor can be ensured. However, in order to avoid the camera acquiring more invalid image information, in this embodiment, a preset range may be set for the access control device, and in a general case, it is sufficient to allow the camera to acquire the face image information within the preset range. Therefore, when a person approaches the access control equipment for a certain distance, the face image information of the person can be acquired through the camera of the access control equipment.
101. If the acquired face image information is not matched with the verified face image information and a pass request is received, determining a responsive terminal of the pass request;
in this embodiment, for the user himself, in order to facilitate the passage of the user and prevent the user from not wearing an access card, forgetting a password, and the like, the user may store the face image of the user himself in advance so as to verify the face image information. Therefore, in this embodiment, after the face image information located within the preset range of the access control device is acquired, it is detected whether the acquired face image information matches with the preset verification face image information, if it is detected that the acquired face image information does not match with the preset verification face image information, it is indicated that the visitor may be a visitor, and if the visitor wants to pass, a passing request may be input through the input component of the access control device. The passing request carries the acquired face image information and the user identification of the target access user.
In order to facilitate the user to respond to the passing request of the visitor in time, the user can set at least one response terminal in the room, so that the user can interact with the access control device through the response terminal at any position of the room. Thus, when a pass request of a visitor is received, a response terminal of the pass request can be determined. The response terminal in this embodiment is preferably a smart speaker, and the smart speaker is provided with a display.
Specifically, if it is detected that the user identifier corresponds to the unique preset response terminal, the preset response terminal is determined to be a response-capable terminal. For example, the user only sets one response terminal, that is, the user can interact with the response terminal at any position in a room, and at this time, after receiving a passing request of a visitor, the unique preset response terminal can be determined as a responsable terminal of the passing request.
If the user identification is detected to correspond to a plurality of preset response terminals, determining the distance between the user and each preset response terminal; and selecting the preset response terminal with the minimum distance as a response terminal.
In a specific implementation process, the distance between a user and each preset response terminal can be determined through radar signals; for example, a radar module may be disposed on the response terminal, the radar module may receive a return signal after transmitting a signal, and after processing the received return signal, the distance between the user and each preset response terminal may be determined, and the preset response terminal with the minimum distance may be selected as a responsable terminal.
In this embodiment, the distance between the user and each preset response terminal may also be determined according to the user location information and the spatial information of each preset response terminal. For example, the image information of the user can be acquired through the preset response terminals, the image information of the user is analyzed, the position information of the user is determined, the distance between the user and each preset response terminal is obtained by calculating the position information of the user and the space information of each preset response terminal, and then the preset response terminal with the minimum distance is selected as the response terminal. The spatial information of each preset response terminal can be stored by automatically acquiring the corresponding spatial information by using a positioning module of each preset response terminal, or by inputting the spatial information of each preset response terminal by a user.
102. Sending the face image information carried by the traffic request to a responsive terminal corresponding to the user identification carried by the traffic request;
in this embodiment, after the responder terminal is determined, the acquired face image information may be sent to the responder terminal corresponding to the user identifier, so that the target user sends the response information of the passage request through the responder terminal.
For example, after a call is made between a target user and a visitor through a response terminal and an access control device, the target user determines whether the visitor is allowed to pass through, and then sends response information of a pass request through the response terminal. In addition, the user can only determine whether the visitor is allowed to pass according to the received face image information, and then the response information of the passing request is sent through the response terminal. Wherein the response information comprises the permission to pass and the prohibition to pass.
In a specific implementation process, if the user is more convenient, the user may manually operate the responded terminal to generate the response information, or, if the user is inconvenient, the user may control the responded terminal to generate the response information through voice, or, if the user is inconvenient, the user may control the responded terminal to generate the response information through body state information. Wherein, the posture information can comprise gestures, body actions and the like.
103. Detecting whether the received response information indicates permission to pass; if yes, go to step 104, if no, go to step 105;
in this embodiment, after receiving the response information of the user, it may be detected whether the received response information indicates permission of passage, if so, step 104 is executed, and if not, step 105 is executed.
104. Generating a passing instruction;
if the received response information indicates that the passage is allowed, a passage instruction can be generated so as to control the unlocking of the access control device, so that the visitor can pass.
105. And generating a pass prohibition instruction.
If the received response information indicates that the passage is forbidden, a passage forbidding instruction can be generated so as to forbid the unlocking of the access control equipment and prevent the visitor from passing.
According to the passing method, the face image information in the preset range of the access control equipment is obtained; if the face image information is detected to be not matched with the verified face image information and a pass request is received, determining a responsive terminal of the pass request, automatically matching the responsive terminal convenient for a user to use, and after the responsive terminal of the pass request is determined, sending the pass request carrying the face image information to the responsive terminal corresponding to the user identifier so that the target user can conveniently and quickly acquire the identity information of the visitor through the responsive terminal and send the response information of the pass request; if the response information indicates that the passage is allowed, generating a passage instruction so as to control the unlocking of the access control equipment; and if the response information shows that the passage is forbidden, generating a passage forbidding instruction so as to forbid the unlocking of the access control equipment. By adopting the technical scheme of the invention, the traffic convenience and safety can be improved.
Further, in the above embodiment, in order to further ensure the safety of the user and facilitate the subsequent inquiry of the visitor by the user, in the embodiment, the acquired face image information may be stored, so that if an abnormality occurs, the face image information may be inquired. For example, viewing with an applet.
In a specific implementation process, the face image information includes a face image and an image annotation, where the image annotation may include an image acquisition time, a number of times the face image is acquired, and the like. Therefore, when the face image information is stored, whether the stored image in the stored image information contains the face image can be detected; if the stored image contains a face image, the stored image is subjected to coverage updating by using the face image, and image annotation is reserved, namely the face image is not changed, only image acquisition time needs to be added, and 1 operation is added to the acquisition times, so that the storage space of the storage module is saved. If the stored image comprises an image, the stored image is subjected to insertion updating by using the face image and the image annotation, namely, the face image and the image annotation are simultaneously reserved.
Further, in the above embodiment, if the face image information is detected to be matched with the verified face image information, the pass instruction is generated so as to control unlocking of the access control device, and thus, the user does not need to carry an access control card with him or her, memorize a password and the like, and can pass without inputting a pass request, and the user only needs to be located within a preset range of the access control device, so that the non-inductive pass can be realized.
In practical application, as the visitor may not go in and out at one time but repeatedly go in and out within a period of time, the user is required to control the access control device each time, which is cumbersome and affects the user experience. For example, a parent who lives in a different place comes to live in the user's home for a period of time, the parent needs to go in and out repeatedly, the user needs to tell the parent a gate card, a password, and the like, or store a face image of the parent as verification face image information, but the user does not want to open the authority to the parent for a long time, and therefore the user needs to delete the face image of the parent, which brings inconvenience to the user.
Specifically, in this embodiment, the image annotation may further include passing permission information corresponding to the face image, where the permission information is preferably time information, that is, when the user uses the face image of the visitor as the verification face image, time information of random access of the visitor may be added, so that when detecting whether the obtained face image information matches the verification face image information, the face image may be compared with a preset verification face image, and the passing permission information corresponding to the face image may be compared with the preset permission information to obtain a comparison result, and if the comparison result is that the face image matches the preset verification face image, and the image annotation matches the preset verification image annotation, it may be detected that the face image information matches the verification face image information; and if the comparison result is that the face image is not matched with the preset verification face image and/or the image annotation is not matched with the preset verification image annotation, detecting that the face image information is not matched with the verification face image information. That is, as long as at least one of the face image and the authority information is not verified, it is detected that the face image information does not match the verified face image information. Therefore, the user does not need to speak the face image of the visitor for deleting subsequently, or the face image of the visitor can be automatically deleted after the time information of the visitor entering and exiting at will reaches the condition.
In practical applications, an accident may occur in a room of a user, and the user cannot handle the accident, or the user is not at home, which causes personal and property risks to the user. For example, the user falls into a room, or the user is not at home, a fire is on the home, and so on. In this case, the visitor or passerby cannot pass through, and the accident cannot be dealt with in time. Therefore, in order to solve the above technical problems, the present invention further provides the following technical solutions.
Specifically, the state information of a user and/or the environmental information of a room can be collected by related detection equipment, the situation that the user is faint or catches fire in the room is judged, the response terminal is used for sending an alarm signal to the entrance guard equipment, at the moment, a visitor or a passerby can input a passing request, the response terminal is used for displaying image information in the room through the entrance guard equipment, and the visitor or the passerby can press a confirmation key under the situation that the visitor or the passerby confirms that the accident exists, so that the entrance guard equipment is opened, and the entrance guard equipment enters the room of the user for rescue.
It should be noted that although the user or the room has an accident and needs to rescue in time, from the perspective of safety, in this embodiment, it is preferable that the person who is closer to the user's residence can open the access control device and enter the user's room for rescue.
For example, for the same community, most residents in the community upload their face images as verification face images, the activities of the residents in the community are more frequent relative to those outside the community, and if an accident occurs in a user or a room, the probability that a person of the resident in the community finds an alarm signal is higher, so that in a normal situation, when the person of the resident in the community rescues, the face image information of the rescuers is acquired and then can be compared with a stored face database, and when the resident is confirmed to be the resident in the community, the entrance guard equipment is unlocked only after the rescuers press a confirmation key.
It should be noted that the method of the embodiment of the present invention may be executed by a single device, such as a computer or a server. The method of the embodiment can also be applied to a distributed scene and completed by the mutual cooperation of a plurality of devices. In the case of such a distributed scenario, one device of the multiple devices may only perform one or more steps of the method according to the embodiment of the present invention, and the multiple devices interact with each other to complete the method.
Fig. 2 is a schematic structural diagram of a first embodiment of a passing device according to the present invention, and as shown in fig. 2, the passing device of the present embodiment includes an obtaining module 20, a determining module 21, a sending module 22, and a control module 23.
The acquisition module 20 is used for acquiring the face image information within the preset range of the access control equipment;
the determining module 21 is configured to determine a response terminal of the pass request if the face image information is detected not to be matched with the verified face image information and the pass request is received; the passing request carries face image information and a user identifier of a target access user;
specifically, the determining module 21 is configured to determine, if it is detected that the user identifier corresponds to the unique preset response terminal, that the preset response terminal serves as a response-enabled terminal; if the user identification is detected to correspond to a plurality of preset response terminals, determining the distance between the user and each preset response terminal; and selecting the preset response terminal with the minimum distance as a response terminal.
For example, the distance between the user and each preset response terminal can be determined through radar signals; and/or determining the distance between the user and each preset response terminal through the user position information and the space information of each preset response terminal.
The sending module 22 is configured to send the face image information to a response-capable terminal corresponding to the user identifier, so that the target user sends response information of the passage request through the response-capable terminal;
in this embodiment, the response information is generated by the user manually operating the response terminal, or the response information is generated by the user controlling the response terminal through voice, or the response information is generated by the user controlling the response terminal through the body state information.
The control module 23 is configured to generate a pass instruction if the response information indicates that the pass is allowed, so as to control the unlocking of the access control device; and if the response information shows that the passage is forbidden, generating a passage forbidding instruction so as to forbid the unlocking of the access control equipment.
The passing device of the embodiment acquires the face image information within the preset range of the access control equipment; if the face image information is detected to be not matched with the verified face image information and a pass request is received, determining a responsive terminal of the pass request, automatically matching the responsive terminal convenient for a user to use, and after the responsive terminal of the pass request is determined, sending the pass request carrying the face image information to the responsive terminal corresponding to the user identifier so that the target user can conveniently and quickly acquire the identity information of the visitor through the responsive terminal and send the response information of the pass request; if the response information indicates that the passage is allowed, generating a passage instruction so as to control the unlocking of the access control equipment; and if the response information shows that the passage is forbidden, generating a passage forbidding instruction so as to forbid the unlocking of the access control equipment. By adopting the technical scheme of the invention, the traffic convenience and safety can be improved.
Fig. 3 is a schematic structural diagram of a second embodiment of the passing device of the present invention, and as shown in fig. 3, the passing device of this embodiment may further include, on the basis of the above embodiment: a memory module 24.
And the storage module 24 is configured to store the acquired face image information, so that if an abnormality occurs, the face image information can be queried.
In a specific implementation process, the face image information includes a face image and an image annotation, where the image annotation may include an image acquisition time, a number of times the face image is acquired, and the like. Therefore, when the face image information is stored, whether the stored image in the stored image information contains the face image can be detected; if the stored image includes a face image, the stored image is updated by using the face image, and the image annotation is retained, that is, the face image is not changed, only the image acquisition time needs to be added, and the acquisition frequency is added by 1, so that the storage space of the storage module 24 is saved. If the stored image comprises an image, the stored image is subjected to insertion updating by using the face image and the image annotation, namely, the face image and the image annotation are simultaneously reserved.
Further, in the above embodiment, the control module 23 is further configured to generate the pass instruction if the detected face image information matches the verified face image information, so as to unlock the access control device, and thus, the user does not need to carry an access control card, remember a password, and the like, and can pass through the access control device, and the user does not need to input a pass request, and can pass through the access control device without sensing only by locating the user within a preset range of the access control device.
Further, in the above embodiment, the determining module 21 is further configured to detect that the face image information matches the verified face image information if the face image matches a preset verified face image and the image annotation matches a preset verified image annotation; and if the face image is not matched with the preset verification face image and/or the image annotation is not matched with the preset verification image annotation, detecting that the face image information is not matched with the verification face image information.
The apparatus of the foregoing embodiment is used to implement the corresponding method in the foregoing embodiment, and has the beneficial effects of the corresponding method embodiment, which are not described herein again.
Fig. 4 is a schematic structural diagram of an embodiment of a passing device of the present invention, and as shown in fig. 4, the passing device of this embodiment may include: a processor 1010, a memory 1020, an input/output interface 1030, a communication interface 1040, and a bus 1050. Wherein the processor 1010, memory 1020, input/output interface 1030, and communication interface 1040 are communicatively coupled to each other within the device via bus 1050.
The processor 1010 may be implemented by a general-purpose CPU (Central Processing Unit), a microprocessor, an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits, and is configured to execute related programs to implement the technical solutions provided in the embodiments of the present disclosure.
The Memory 1020 may be implemented in the form of a ROM (Read Only Memory), a RAM (Random access Memory), a static storage device, a dynamic storage device, or the like. The memory 1020 may store an operating system and other application programs, and when the technical solution provided by the embodiments of the present specification is implemented by software or firmware, the relevant program codes are stored in the memory 1020 and called to be executed by the processor 1010.
The input/output interface 1030 is used for connecting an input/output module to input and output information. The i/o module may be configured as a component in a device (not shown) or may be external to the device to provide a corresponding function. The input devices may include a keyboard, a mouse, a touch screen, a microphone, various sensors, etc., and the output devices may include a display, a speaker, a vibrator, an indicator light, etc.
The communication interface 1040 is used for connecting a communication module (not shown in the drawings) to implement communication interaction between the present apparatus and other apparatuses. The communication module can realize communication in a wired mode (such as USB, network cable and the like) and also can realize communication in a wireless mode (such as mobile network, WIFI, Bluetooth and the like).
Bus 1050 includes a path that transfers information between various components of the device, such as processor 1010, memory 1020, input/output interface 1030, and communication interface 1040.
It should be noted that although the above-mentioned device only shows the processor 1010, the memory 1020, the input/output interface 1030, the communication interface 1040 and the bus 1050, in a specific implementation, the device may also include other components necessary for normal operation. In addition, those skilled in the art will appreciate that the above-described apparatus may also include only those components necessary to implement the embodiments of the present description, and not necessarily all of the components shown in the figures.
Fig. 5 is a schematic structural diagram of an embodiment of the passing system of the present invention, and as shown in fig. 5, the passing system of the present embodiment includes an entrance guard device 11, at least one response terminal 12 associated with each user identifier, and the passing device 10 of the above embodiment;
the access control equipment 11 is used for acquiring face image information within a preset range;
the passing device 10 is used to implement the passing method of the above-described embodiment.
The present invention also provides a storage medium characterized in that the storage medium stores computer instructions for causing the computer to execute the control method of the distributed terminal of the above embodiment.
Computer-readable media of the present embodiments, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant to be exemplary only, and is not intended to intimate that the scope of the disclosure, including the claims, is limited to these examples; within the idea of the invention, also features in the above embodiments or in different embodiments may be combined, steps may be implemented in any order, and there are many other variations of the different aspects of the invention as described above, which are not provided in detail for the sake of brevity.
In addition, well known power/ground connections to Integrated Circuit (IC) chips and other components may or may not be shown within the provided figures for simplicity of illustration and discussion, and so as not to obscure the invention. Furthermore, devices may be shown in block diagram form in order to avoid obscuring the invention, and also in view of the fact that specifics with respect to implementation of such block diagram devices are highly dependent upon the platform within which the present invention is to be implemented (i.e., specifics should be well within purview of one skilled in the art). Where specific details (e.g., circuits) are set forth in order to describe example embodiments of the invention, it should be apparent to one skilled in the art that the invention can be practiced without, or with variation of, these specific details. Accordingly, the description is to be regarded as illustrative instead of restrictive.
While the present invention has been described in conjunction with specific embodiments thereof, many alternatives, modifications, and variations of these embodiments will be apparent to those of ordinary skill in the art in light of the foregoing description. For example, other memory architectures (e.g., dynamic ram (dram)) may use the discussed embodiments.
The embodiments of the invention are intended to embrace all such alternatives, modifications and variances that fall within the broad scope of the appended claims. Therefore, any omissions, modifications, substitutions, improvements and the like that may be made without departing from the spirit and principles of the invention are intended to be included within the scope of the invention.

Claims (10)

1. A method of passage, comprising:
acquiring face image information located in a preset range of access control equipment;
if the face image information is detected not to be matched with the verified face image information and a pass request is received, determining a responsive terminal of the pass request; the passing request carries the face image information and a user identifier of a target access user;
sending the face image information to a responsive terminal corresponding to the user identification so that a target user can send response information of the passing request through the responsive terminal;
if the response information indicates that the passage is allowed, generating the passage instruction so as to control the unlocking of the access control equipment;
and if the response information shows that the passage is forbidden, generating the passage forbidding instruction so as to forbid the unlocking of the access control equipment.
2. The passing method according to claim 1, wherein the response information is generated by the user manually operating the responsable terminal, or the response information is generated by the user controlling the responsable terminal through voice, or the response information is generated by the user controlling the responsable terminal through posture information.
3. A transit method as claimed in claim 1, further comprising:
and storing the facial image information so as to inquire the facial image information.
4. A transit method as claimed in claim 3, wherein the face image information includes a face image and an image annotation;
the storing the face image information includes:
detecting whether stored images in stored image information contain the face images or not;
if the stored image comprises the face image, performing overlay updating on the stored image by using the face image, and keeping the image annotation;
and if the stored image comprises the image, performing insertion updating on the stored image by using the face image and the image annotation.
5. The passing method according to claim 4, wherein the detecting whether the facial image information carried in the passing request matches with the preset verification facial image information comprises:
if the face image is matched with a preset verification face image and the image annotation is matched with the preset verification image annotation, detecting that the face image information is matched with the verification face image information;
and if the face image is not matched with a preset verification face image and/or the image annotation is not matched with the preset verification image annotation, detecting that the face image information is not matched with the verification face image information.
6. The transit method of claim 1, wherein the determining the responsive terminal to the transit request further comprises:
if the user identification is detected to correspond to the only preset response terminal, determining the preset response terminal as the response-capable terminal;
if the user identification is detected to correspond to a plurality of preset response terminals, determining the distance between the user and each preset response terminal;
and selecting a preset response terminal with the minimum distance as the response terminal.
7. The passing method of claim 6, wherein the determining the distance between the user and each of the preset response terminals comprises:
determining the distance between the user and each preset response terminal through radar signals; and/or
And determining the distance between the user and each preset response terminal according to the user position information and the space information of each preset response terminal.
8. The transit method according to any one of claims 1 to 7, further comprising:
and if the face image information is detected to be matched with the verified face image information, generating the passing instruction so as to control the unlocking of the access control equipment.
9. A transit device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method according to any one of claims 1 to 8 when executing said program.
10. A transit system comprising access control equipment, at least one response terminal associated with each user identity and the transit device of claim 9;
the access control equipment is used for acquiring face image information within a preset range;
the transit device is used for implementing the method of any one of claims 1 to 8.
CN202010340225.7A 2020-04-26 2020-04-26 Passing method, device and system Pending CN111554025A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010340225.7A CN111554025A (en) 2020-04-26 2020-04-26 Passing method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010340225.7A CN111554025A (en) 2020-04-26 2020-04-26 Passing method, device and system

Publications (1)

Publication Number Publication Date
CN111554025A true CN111554025A (en) 2020-08-18

Family

ID=72005865

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010340225.7A Pending CN111554025A (en) 2020-04-26 2020-04-26 Passing method, device and system

Country Status (1)

Country Link
CN (1) CN111554025A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112652099A (en) * 2020-12-29 2021-04-13 深圳市欧瑞博科技股份有限公司 Intelligent control method of user authority, intelligent communication equipment and computer readable storage medium
CN113487776A (en) * 2021-08-26 2021-10-08 云知声(上海)智能科技有限公司 Smart community cross-type equipment integrated card issuing system and method
CN114120512A (en) * 2021-11-19 2022-03-01 云知声(上海)智能科技有限公司 Intelligent access control system and control method thereof

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104850771A (en) * 2015-04-30 2015-08-19 广东欧珀移动通信有限公司 Identity verification method and related equipment
CN106056710A (en) * 2016-06-02 2016-10-26 北京云知声信息技术有限公司 Method and device for controlling intelligent electronic locks
CN106230714A (en) * 2016-08-31 2016-12-14 海尔优家智能科技(北京)有限公司 A kind of method and device responding communication request
CN108171841A (en) * 2017-12-28 2018-06-15 北京洪泰同创信息技术有限公司 A kind of the gate inhibition's method for unlocking and system of achievable reservation visit
CN108711208A (en) * 2018-05-21 2018-10-26 中兴智能视觉大数据技术(湖北)有限公司 A kind of big data access control system and its management method
KR20180127080A (en) * 2017-05-19 2018-11-28 주식회사 코맥스 System and method for verifying entry by using quick response code
CN109118616A (en) * 2018-07-09 2019-01-01 深圳市商汤科技有限公司 access control method and access control device
US20190028478A1 (en) * 2017-07-21 2019-01-24 Schlage Lock Company Llc Leveraging flexible distributed tokens in an access control system
CN109544748A (en) * 2018-11-21 2019-03-29 深圳市商汤科技有限公司 Access control management method and access control terminal, system
CN110363961A (en) * 2019-07-26 2019-10-22 美的置业集团有限公司 Alarming method by monitoring, device, medium and terminal device are fallen down in a kind of user family

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104850771A (en) * 2015-04-30 2015-08-19 广东欧珀移动通信有限公司 Identity verification method and related equipment
CN106056710A (en) * 2016-06-02 2016-10-26 北京云知声信息技术有限公司 Method and device for controlling intelligent electronic locks
CN106230714A (en) * 2016-08-31 2016-12-14 海尔优家智能科技(北京)有限公司 A kind of method and device responding communication request
KR20180127080A (en) * 2017-05-19 2018-11-28 주식회사 코맥스 System and method for verifying entry by using quick response code
US20190028478A1 (en) * 2017-07-21 2019-01-24 Schlage Lock Company Llc Leveraging flexible distributed tokens in an access control system
CN108171841A (en) * 2017-12-28 2018-06-15 北京洪泰同创信息技术有限公司 A kind of the gate inhibition's method for unlocking and system of achievable reservation visit
CN108711208A (en) * 2018-05-21 2018-10-26 中兴智能视觉大数据技术(湖北)有限公司 A kind of big data access control system and its management method
CN109118616A (en) * 2018-07-09 2019-01-01 深圳市商汤科技有限公司 access control method and access control device
CN109544748A (en) * 2018-11-21 2019-03-29 深圳市商汤科技有限公司 Access control management method and access control terminal, system
CN110363961A (en) * 2019-07-26 2019-10-22 美的置业集团有限公司 Alarming method by monitoring, device, medium and terminal device are fallen down in a kind of user family

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112652099A (en) * 2020-12-29 2021-04-13 深圳市欧瑞博科技股份有限公司 Intelligent control method of user authority, intelligent communication equipment and computer readable storage medium
CN113487776A (en) * 2021-08-26 2021-10-08 云知声(上海)智能科技有限公司 Smart community cross-type equipment integrated card issuing system and method
CN114120512A (en) * 2021-11-19 2022-03-01 云知声(上海)智能科技有限公司 Intelligent access control system and control method thereof
CN114120512B (en) * 2021-11-19 2024-03-08 云知声(上海)智能科技有限公司 Intelligent access control system and control method thereof

Similar Documents

Publication Publication Date Title
US11663870B2 (en) Scalable systems and methods for monitoring and concierge service
CN111554025A (en) Passing method, device and system
CA2924381C (en) Access control using portable electronic devices
US20150325067A1 (en) Access management system and method
US10176654B2 (en) Suspicious person detection system, suspicious person detection method
CN107862774B (en) Access control calling method, system and client
US10915777B2 (en) Communication terminal, communication system, and image processing method
US11875622B2 (en) Authentication method and user equipment
CN110383356B (en) Monitoring system
JP7298945B2 (en) Near-field information authentication method, near-field information authentication device, electronic equipment and computer storage medium
KR20210029953A (en) Apparatus and method for controlling a lobby phone that enables video surveillance through a communication terminal that can use a 5G mobile communication network based on facial recognition technology
KR20170122985A (en) An access certification system and the method thereof
CN111373453A (en) Entrance monitoring system with radio and face recognition mechanism
CN111547587A (en) Elevator control method, device, equipment, elevator and storage medium
CN114267105A (en) Doorbell control method, intelligent doorbell and related equipment
KR102251931B1 (en) System for user security using home communication device and method therefor
CN112258700A (en) Access control equipment, unlocking method and device and storage medium
CN112735015A (en) Community management method, device, machine readable medium and equipment
KR101907108B1 (en) Smart door lock device and control method
KR102198256B1 (en) Wall-Pad and Smart Home System Including the Same
KR20160070080A (en) Authentication system for a mobile data terminal
CN110717605B (en) Block chain-based access information processing method and device
JP2019087896A (en) Lobby interphone, processing system, and program
JP2018074446A (en) Intercom system for multiple dwelling house
JP7108425B2 (en) doorbell system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200818