CN112164169A - Access control management method and device, access control equipment and computer readable storage medium - Google Patents

Access control management method and device, access control equipment and computer readable storage medium Download PDF

Info

Publication number
CN112164169A
CN112164169A CN202011000481.8A CN202011000481A CN112164169A CN 112164169 A CN112164169 A CN 112164169A CN 202011000481 A CN202011000481 A CN 202011000481A CN 112164169 A CN112164169 A CN 112164169A
Authority
CN
China
Prior art keywords
face brushing
algorithm
face
access control
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011000481.8A
Other languages
Chinese (zh)
Inventor
郭树霞
卢道和
陈洁丹
舒玉强
雷声伟
李薇
蔡志杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WeBank Co Ltd
Original Assignee
WeBank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WeBank Co Ltd filed Critical WeBank Co Ltd
Priority to CN202011000481.8A priority Critical patent/CN112164169A/en
Publication of CN112164169A publication Critical patent/CN112164169A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/19Connection re-establishment

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention relates to the technical field of financial science and technology, and discloses an access control management method and device, access control equipment and a computer readable storage medium. The access control method comprises the following steps: when a face brushing event is detected, generating face brushing data corresponding to the face brushing event; caching the face brushing data into a local memory, and uploading the face brushing data to a background server; when the fact that the communication connection between the access control equipment and the background server is disconnected is detected, the face brushing data is stopped being uploaded, and the communication connection state of the access control equipment is monitored in a timed or real-time mode; and when the communication connection is detected to be reestablished, recalling the face brushing data from the local memory and continuously uploading the face brushing data. The invention can solve the problem that face brushing data is easy to lose when the communication of the access control equipment is disconnected in the prior art.

Description

Access control management method and device, access control equipment and computer readable storage medium
Technical Field
The invention relates to the technical field of financial technology (Fintech), in particular to an access control management method and device, access control equipment and a computer readable storage medium.
Background
With the development of computer technology, more and more technologies are applied in the financial field, and the traditional financial industry is gradually changing to financial technology (Fintech), but higher requirements are also put forward on the technologies due to the requirements of the financial industry on safety and real-time performance.
The entrance guard equipment is a novel modern safety management equipment, integrates a microcomputer automatic identification technology and modern safety management measures, relates to a plurality of new technologies such as electronics, machinery, optics, computer technology, communication technology, biotechnology and the like, and is widely applied to building entrance guard systems for controlling the entrance and exit of users and collecting and reporting the entrance and exit data of the users. The existing access control equipment usually supports identity verification, such as verification of a face, a work card, an identity card and the like of a user, and in order to ensure accuracy and authenticity of a verification result, the verification is generally performed in a face recognition mode. In many application scenarios, such as an attendance checking scenario, it is generally necessary to report the face brushing data of the user to the background server, so as to facilitate subsequent data statistics and query. The network condition of the access control equipment is not controllable, the current face brushing data can be reported by the existing access control equipment when the network exists, and the face brushing data in the case of network disconnection can not be reported to cause loss under the condition of network disconnection. And reporting the face brushing data again when a network exists. Therefore, how to avoid the loss of the face refreshing data when the communication of the access control device is disconnected is a problem which needs to be solved urgently at present.
Disclosure of Invention
The invention mainly aims to provide an access control management method, an access control management device, access control equipment and a computer readable storage medium, and aims to solve the problem that face brushing data is easy to lose when communication of the access control equipment is disconnected in the prior art.
In order to achieve the above object, the present invention provides an access control method, including:
when a face brushing event is detected, generating face brushing data corresponding to the face brushing event;
caching the face brushing data into a local memory, and uploading the face brushing data to a background server;
when the fact that the communication connection between the access control equipment and the background server is disconnected is detected, the face brushing data is stopped being uploaded, and the communication connection state of the access control equipment is monitored in a timed or real-time mode;
and when the communication connection is detected to be reestablished, recalling the face brushing data from the local memory and continuously uploading the face brushing data.
Optionally, when a face brushing event is detected, the step of generating face brushing data corresponding to the face brushing event includes:
when a face brushing event is detected, executing a face brushing data generation task through a preset storage thread to obtain face brushing data corresponding to the face brushing event;
the step of caching the face brushing data into a local memory and uploading the face brushing data to a background server comprises the following steps:
caching the face brushing data into a local memory through the preset storage thread, and sending uploading information corresponding to the face brushing event to a preset sending thread, so that the face brushing data is called through the preset sending thread based on the uploading information and uploaded to a background server;
when the communication connection is detected to be reestablished, the step of recalling the face brushing data from the local memory and continuously uploading the face brushing data comprises the following steps:
and when the communication connection is detected to be reestablished, waking up the preset sending thread, recalling the face brushing data from the local memory, and continuously uploading the face brushing data.
Optionally, the face brushing data includes a face brushing image and detail information, and the access control method further includes:
acquiring a first residual storage space of the local memory at regular time or in real time, and judging whether the first residual storage space is smaller than a preset threshold value or not;
if the first residual storage space is smaller than the preset threshold, deleting the face brushing images according to the face brushing time so as to keep the latest face brushing images with a first preset number;
after the first deletion is completed, acquiring a second residual storage space of the local memory, and judging whether the second residual storage space is smaller than the preset threshold value;
if the second remaining storage space is smaller than the preset threshold, deleting the retained latest face brushing image;
after the second deletion is completed, acquiring a third remaining storage space of the local memory, and judging whether the third remaining storage space is smaller than the preset threshold value;
and if the third remaining storage space is smaller than the preset threshold, deleting the detail information according to the face brushing time so as to keep a second preset number of latest detail information.
Optionally, the access control method further includes:
when detecting that the face brushing application is cold started, acquiring a first model version number of the face brushing application, and acquiring a second model version number stored in the local memory;
detecting whether the first model version number is consistent with the second model version number;
and if the model face images are not consistent, extracting the features of the sample face images pre-stored in the local memory to obtain a new feature value, and updating the version number of the second model into the version number of the first model.
Optionally, the step of extracting features of the sample face image pre-stored in the local memory to obtain a new feature value includes:
extracting the characteristics of the sample face image pre-stored in the local memory, and detecting whether the sample face image with the characteristic extraction failure exists;
if the characteristic value does not exist, the extracted characteristic value is used as a new characteristic value;
if the extracted characteristic value exists, the extracted characteristic value is used as a first characteristic value, and a corresponding image resetting request is sent to the background server based on the sample face image which is unsuccessfully extracted;
and receiving a sample face reset image returned by the background server, and performing feature extraction on the sample face reset image to obtain a second feature value, wherein the new feature value comprises the first feature value and the second feature value.
Optionally, the access control method further includes:
when an algorithm switching request is received, acquiring a target switching algorithm according to the algorithm switching request;
and updating the current algorithm mark of the preset intermediate layer to the algorithm mark corresponding to the target switching algorithm, and calling the algorithm module of the target switching algorithm based on the updated algorithm mark.
Optionally, the access control method further includes:
when an algorithm modification request is received, obtaining a modification type and an algorithm to be modified according to the algorithm modification request;
if the modification type is deletion, deleting the algorithm module corresponding to the algorithm to be modified, and deleting the algorithm mark corresponding to the algorithm to be modified in the preset intermediate layer;
if the modification type is increased, adding an algorithm module corresponding to the algorithm to be modified, adding an algorithm mark corresponding to the algorithm to be modified in the preset intermediate layer, and adding a parameter corresponding to the algorithm to be modified in an interface parameter of the preset intermediate layer.
In addition, to achieve the above object, the present invention also provides an access control device, including:
the data generation module is used for generating face brushing data corresponding to the face brushing event when the face brushing event is detected;
the data caching module is used for caching the face brushing data into a local memory and uploading the face brushing data to a background server;
the state monitoring module is used for stopping uploading the face brushing data when the fact that the communication connection between the access control equipment and the background server is disconnected is detected, and monitoring the communication connection state of the access control equipment in a timed or real-time mode;
and the readjustment uploading module is used for readjusting the face brushing data from the local memory and continuously uploading the face brushing data when the communication connection reestablishment is detected.
In addition, to achieve the above object, the present invention further provides an access control device, including: the access control system comprises a memory, a processor and an access control management program which is stored on the memory and can run on the processor, wherein the access control management program realizes the steps of the access control management method when being executed by the processor.
In addition, to achieve the above object, the present invention further provides a computer-readable storage medium, in which an access control management program is stored, and the access control management program implements the steps of the access control management method when being executed by a processor.
The invention provides an access control management method, device, equipment and a computer readable storage medium, wherein when a face brushing event is detected, face brushing data corresponding to the face brushing event is generated; then, caching the face brushing data into a local memory, and uploading the face brushing data to a background server; when the fact that the communication connection between the access control equipment and the background server is disconnected is detected, the uploading of the face brushing data is stopped, and the communication connection state of the access control equipment is monitored in a timed or real-time mode; when the communication connection is detected to be reestablished, the face brushing data is recalled from the local memory and continuously uploaded. According to the invention, after the face brushing data is generated, the face brushing data is cached in the local memory, when the communication connection disconnection is detected, the uploading of the face brushing data is stopped, the communication connection state of the access control equipment is monitored, when the communication connection is reestablished, the face brushing data is recalled from the local memory and continuously uploaded, and through the mode, the face brushing data can be prevented from being lost when the communication of the access control equipment is disconnected, so that the effectiveness of access control management can be improved.
Drawings
FIG. 1 is a schematic diagram of an apparatus architecture of a hardware operating environment according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of a first embodiment of the access control method of the present invention;
fig. 3 is a schematic flow chart of a second embodiment of the access control method of the present invention;
fig. 4 is a schematic functional module diagram of a first embodiment of the access control device according to the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Referring to fig. 1, fig. 1 is a schematic device structure diagram of a hardware operating environment according to an embodiment of the present invention.
The embodiment of the invention provides access control equipment.
As shown in fig. 1, the access control apparatus may include: a processor 1001, such as a CPU, a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., a Wi-Fi interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a storage device separate from the processor 1001.
Those skilled in the art will appreciate that the access device configuration shown in fig. 1 does not constitute a limitation of the access device and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, a memory 1005, which is a kind of computer storage medium, may include an operating system, a network communication module, and an access control management program.
In the terminal shown in fig. 1, the network interface 1004 is mainly used for connecting to a backend server and performing data communication with the backend server; the user interface 1003 is mainly used for connecting a client and performing data communication with the client; and the processor 1001 may be configured to call the access control management program stored in the memory 1005 and perform the following steps of the access control management method.
Based on the hardware structure, the invention provides various embodiments of the access control management method.
The invention provides an access control management method.
Referring to fig. 2, fig. 2 is a schematic flow chart of a first embodiment of the access control method of the present invention.
In this embodiment, the access control method includes:
step S10, when a face brushing event is detected, face brushing data corresponding to the face brushing event is generated;
the access control management method of the embodiment is realized by access control equipment, and the access control equipment is loaded with a face brushing application for inputting, identifying and comparing human faces and generating corresponding face brushing data. In this embodiment, when a face brushing event is detected, face brushing data corresponding to the face brushing event is generated. The face brushing event can be triggered when a human face is detected or when a face brushing instruction is received. The face brushing data comprises face brushing images and face brushing details, the face brushing images are face images obtained by shooting when a user brushes the face, and the face brushing details comprise but are not limited to face brushing starting time (namely face brushing triggering time), face brushing ending time (face brushing finishing time), face brushing scores (face matching scores in the face recognition process), face brushing results (including but not limited to face matching results, living body detection results and the like), and other detailed face brushing information every time. In addition, to save memory space, the brushed image is typically compressed.
Step S20, caching the face brushing data into a local memory, and uploading the face brushing data to a background server;
and then, caching the face brushing data into a local memory, and uploading the face brushing data to a background server. The local Memory is a local Memory space of the access control device, such as an SD (Secure Digital Memory Card/SD Card) Card, and the execution of the caching step and the execution of the uploading step are not in sequence. During caching, a data caching folder of each face brushing event can be established based on the face brushing starting time so as to facilitate subsequent query, transmission and cleaning.
Step S30, when the fact that the communication connection between the access control equipment and the background server is disconnected is detected, the face brushing data is stopped to be uploaded, and the communication connection state of the access control equipment is monitored regularly or in real time;
when the fact that the communication connection between the access control equipment and the background server is disconnected (such as network disconnection) is detected, the uploading of the face brushing data is stopped, and the communication connection state between the access control equipment and the background server is monitored regularly or in real time. Specifically, if the access control device is connected with the background server through a mobile network (such as 4G), the network change condition of the access control device can be monitored in a registration broadcast manner to monitor the communication connection state of the access control device and the background server; if the access control equipment is connected with the background server through the local area network, the communication connection state of the access control equipment and the background server can be monitored by monitoring the connection condition of the restricted network of the access control equipment; if the access control equipment is connected with the background server in a Bluetooth mode, the communication connection state of the access control equipment and the background server can be monitored by monitoring the Bluetooth connection condition of the access control equipment.
Step S40, when detecting that the communication connection is reestablished, recalling the face brushing data from the local memory, and continuing to upload the data.
When the communication connection is detected to be reestablished, the face brushing data is recalled from the local memory and continuously uploaded. Here, it should be noted that when any piece of face brushing data is successfully uploaded to the background server, the piece of face brushing data in the local memory may be deleted, so as to avoid occupying the memory and avoiding subsequent repeated uploading. Correspondingly, when the face brushing data is called again, the folder with the earliest time can be obtained according to the name of the data cache folder in the local memory to upload the face brushing data.
The embodiment of the invention provides an access control method, which comprises the steps of generating face brushing data corresponding to a face brushing event when the face brushing event is detected; then, caching the face brushing data into a local memory, and uploading the face brushing data to a background server; when the fact that the communication connection between the access control equipment and the background server is disconnected is detected, the uploading of the face brushing data is stopped, and the communication connection state of the access control equipment is monitored in a timed or real-time mode; when the communication connection is detected to be reestablished, the face brushing data is recalled from the local memory and continuously uploaded. In the embodiment of the invention, after the face brushing data is generated, the face brushing data is cached in the local memory, when the communication connection disconnection is detected, the uploading of the face brushing data is stopped, the communication connection state of the access control equipment is monitored, when the communication connection is reestablished, the face brushing data is recalled from the local memory and continuously uploaded, and by the above mode, the loss of the face brushing data can be avoided when the communication of the access control equipment is disconnected, so that the effectiveness of the access control management can be improved.
In the prior art, in the face brushing process, the camera stream is converted into the face brushing image and compressed by the same thread, and then the image is uploaded to a background server, so that the next face brushing process can be performed, and because the whole process of generation, compression and uploading of the image consumes a long time, a next face brushing user needs to wait for a long time, thereby affecting the face brushing process experience of the user.
In view of the above, a second embodiment of the access control method according to the present invention is provided based on the first embodiment.
In the present embodiment, step S10 includes:
step S11, when a face brushing event is detected, executing a face brushing data generation task through a preset storage thread to obtain face brushing data corresponding to the face brushing event;
in the embodiment, two threads are set up in advance and are respectively a preset storage thread and a preset sending thread, wherein the preset storage thread is used for executing the data generation and storage steps, the preset sending thread is used for executing the data uploading step, and asynchronous processing is performed through the preset storage thread and the preset sending thread so as to separate the data generation and storage processes from the data uploading process, so that the response speed can be improved, the waiting time of a user can be shortened, and the face brushing flow experience of the user can be improved.
In this embodiment, when a face brushing event is detected, the preset storage thread executes a face brushing data generation task to obtain face brushing data corresponding to the face brushing event. The face brushing event can be triggered when a human face is detected or when a face brushing instruction is received. The face brushing data comprises face brushing images and face brushing details, the face brushing images are face images obtained by shooting when a user brushes the face, and the face brushing details comprise but are not limited to face brushing starting time (namely face brushing triggering time), face brushing ending time (face brushing finishing time), face brushing scores (face matching scores in the face recognition process), face brushing results (including but not limited to face matching results, living body detection results and the like), and other detailed face brushing information every time. In addition, to save memory space, the brushed image is typically compressed.
At this time, step S20 includes:
step S21, caching the face brushing data in a local memory through the preset storage thread, and sending upload information corresponding to the face brushing event to a preset sending thread, so as to call the face brushing data based on the upload information through the preset sending thread and upload the face brushing data to a background server;
and then caching the face brushing data into a local Memory through a preset storage thread, wherein the local Memory is a local Memory space of the access control equipment, such as an SD (Secure Digital Memory Card/SD Card) Card, and the execution sequence of the caching step and the uploading step is not sequential. During caching, a data caching folder of each face brushing event can be established based on the face brushing starting time so as to facilitate subsequent query, transmission and cleaning.
And simultaneously, transmitting uploading information corresponding to the face brushing event to a preset transmitting thread, and calling face brushing data based on the uploading information through the preset transmitting thread and uploading the face brushing data to a background server. The uploading information can be generated and obtained based on the face brushing starting time of the face brushing event, so that the subsequent preset sending thread can determine the face brushing data needing to be uploaded based on the uploading information and call the face brushing data to upload the face brushing data.
And executing step S30, stopping uploading the face brushing data when the communication connection between the access control equipment and the background server is detected to be disconnected, and monitoring the communication connection state of the access control equipment regularly or in real time. The monitoring mode of the communication connection state of the access control device can refer to the first embodiment, and is not described herein.
At this time, step S40 includes:
and step S41, when detecting that the communication connection is reestablished, waking up the preset sending thread, recalling the face brushing data from the local memory, and continuing to upload the face brushing data.
And when the communication connection is detected to be reestablished, waking up the preset sending thread so as to recall the face brushing data from the local memory through the preset sending thread and continuously uploading the face brushing data.
In the embodiment, the two processes of data generation and storage and data uploading are separated by adopting an asynchronous thread mode to perform asynchronous processing, so that the response speed can be improved, the waiting time of a user is shortened, and the face brushing flow experience of the user is improved. Meanwhile, in the embodiment of the invention, after the face brushing data is generated, the face brushing data is cached in the local memory, when the communication connection disconnection is detected, the uploading of the face brushing data is stopped, the communication connection state of the access control equipment is monitored, and when the communication connection is reestablished, the face brushing data is recalled from the local memory and continuously uploaded.
Further, based on the first embodiment, a third embodiment of the access control method of the present invention is provided.
In this embodiment, the face brushing data includes a face brushing image and detail information, and the access control method further includes:
step A, acquiring a first residual storage space of the local memory at regular time or in real time, and judging whether the first residual storage space is smaller than a preset threshold value or not;
in this embodiment, because the network condition of access control equipment is uncontrollable, under the condition that the communication connection of access control equipment and background server is disconnected, the face brushing data can not be sent to the background server, which will lead to data accumulation and cause the occupation of memory space. Excessive occupation of memory space may affect the operation of the face brushing application, such as direct crash or white screen. In this embodiment, the remaining storage space of the local memory is monitored in a timed or real-time manner, and when the remaining storage space is detected to be smaller, the corresponding deletion is performed. In the deleting process, the stable operation of the face brushing application is not influenced while the face brushing data is kept as much as possible.
Specifically, the current remaining storage space of the local memory is obtained at regular time or in real time, and is recorded as a first remaining storage space, and whether the first remaining storage space is smaller than a preset threshold value is judged. The preset threshold is set based on a minimum remaining storage space value which affects the operation of the face brushing application, and experiments show that the operation of the face brushing program is affected when the space of the local memory is less than 500 megabytes, and correspondingly, the preset threshold should be greater than the minimum remaining storage space value, for example, 700 megabytes can be set.
If the first remaining storage space is smaller than the preset threshold, executing step B: deleting the face brushing images according to the face brushing time so as to keep the latest face brushing images with a first preset number;
if the first remaining storage space is smaller than the preset threshold, the face brushing image occupies a larger memory and has a smaller importance to the client than the detail information, so that the face brushing image can be deleted according to the face brushing time to keep the latest face brushing images in the first preset number. The first preset number can be flexibly set according to actual conditions. When the deletion is performed, the deletion may be performed based on the name of the folder (as the face brushing start time) to retain the latest face brushing image.
Further, if the first remaining storage space is less than or equal to the preset threshold, continuing to execute step a, obtaining the first remaining storage space of the local memory at regular time or in real time, and determining whether the first remaining storage space is less than the preset threshold.
Step C, after the first deletion is completed, acquiring a second residual storage space of the local memory, and judging whether the second residual storage space is smaller than the preset threshold value or not;
after the first deletion (i.e., the deletion of the face-brushing image) is completed, the current remaining storage space of the local memory is obtained and recorded as a second remaining storage space, and whether the second remaining storage space is smaller than a preset threshold is determined, so as to further determine whether the remaining storage space of the local memory after the first deletion still affects the operation of the face-brushing application.
If the second remaining storage space is smaller than the preset threshold, executing step D: deleting the retained latest face brushing image;
and if the second remaining storage space is smaller than the preset threshold, deleting the retained latest face brushing image.
Further, if the second remaining storage space is less than or equal to the preset threshold, continuing to execute step a, obtaining the first remaining storage space of the local memory in a timed or real-time manner, and determining whether the first remaining storage space is less than the preset threshold.
Step E, after the second deletion is completed, acquiring a third residual storage space of the local memory, and judging whether the third residual storage space is smaller than the preset threshold value or not;
after the second deletion (i.e., the deletion of the retained latest face brushing image) is completed, the current remaining storage space of the local memory is obtained and recorded as a third remaining storage space, and whether the third remaining storage space is smaller than a preset threshold is determined, so as to further determine whether the remaining storage space of the local memory after the second deletion still affects the operation of the face brushing application.
If the third remaining storage space is smaller than the preset threshold, executing step F: and deleting the detail information according to the face brushing time so as to keep the latest detail information of a second preset number.
And if the third remaining storage space is smaller than the preset threshold, deleting the detail information according to the face brushing time so as to keep the latest detail information of a second preset number. Because each piece of detail information occupies a small memory, the second preset number can be set to a small value, such as 100, and the specific numerical value can be flexibly set according to the actual situation.
Further, if the third remaining storage space is less than or equal to the preset threshold, continuing to execute step a, obtaining the first remaining storage space of the local memory at regular time or in real time, and determining whether the first remaining storage space is less than the preset threshold.
It should be noted that the execution of the steps a to F may be performed after the step "when the communication connection between the access control device and the background server is detected" is detected, and may also be performed in parallel with the execution of the steps S10 to S40.
In addition, it should be noted that, in specific implementation, the memory may be cleaned by combining with another cleaning scheme, and specifically, the access control method may further include:
and detecting whether an expired log file exists at preset time intervals, wherein the expired log file is a log file which exceeds the preset time from the current time, such as a log file before 1 month, and if the expired log file exists, clearing the expired log file so as to further clear the local memory.
In this embodiment, by detecting the remaining storage space of the local memory in real time and deleting the detailed data by using the corresponding cleaning strategy, stable operation of the face brushing application is not affected while reporting each stroke of face brushing data as much as possible, thereby improving stability and effectiveness of the access control management.
Furthermore, the face recognition process related to the face brushing process is usually realized by an algorithm model, and the corresponding algorithm model exists in the face brushing application, and the algorithm model is continuously updated along with the continuous improvement of the detection requirements such as the detection accuracy, the response speed and the like. When the algorithm model is updated, feature extraction needs to be carried out on the sample face image features stored in the background server again, and comparison is carried out on the feature values obtained through extraction and the feature values of the collected face brushing images. However, because the sample face image is stored in the background server, when the algorithm model is updated, the sample face image needs to be obtained from the background server and the characteristic value needs to be extracted again, when the number of the sample face images is large and the network is unstable, the background server has high pressure and consumes long time, so that the face brushing application cannot be used for a long time, and the use experience of a user can be greatly influenced.
In view of the above, a fourth embodiment of the access control method according to the present invention is provided based on the first to third embodiments.
In this embodiment, the access control method further includes:
step G, when detecting that the face brushing application is cold started, acquiring a first model version number of the face brushing application, and acquiring a second model version number stored in the local memory;
in this embodiment, when detecting that the face brushing application is cold-started, a first model version number of the face brushing application is obtained, and a second model version number stored in the local memory is obtained. The cold start refers to that before the application is started, the background does not have the process of the application, and at this time, the system can recreate a new process to be allocated to the application. That is, when the presence of the face brushing application in the background is detected, it can be determined that the face brushing application cold start is detected. The first model version number is a model version number obtained from the interior of an application memory of the face brushing application, namely the version number of the updated model in the face brushing application; and the second model version number is a locally stored model version number.
Step H, detecting whether the version number of the first model is consistent with the version number of the second model;
then, whether the first model version number is consistent with the second model version number is detected, so that whether the model is updated or not is detected.
If not, executing step I: and extracting the characteristics of the sample face image pre-stored in the local memory to obtain a new characteristic value, and updating the version number of the second model into the version number of the first model.
And if the first model version number is not consistent with the second model version number, extracting the features of the sample face image pre-stored in the local memory to obtain a new feature value, and updating the second model version number into the first model version number so as to facilitate the comparison of the subsequent model version numbers. The sample face image is a face image of a user to be identified, which is acquired in advance, and is used for subsequent face identification and comparison. In the embodiment, the sample face image is downloaded from the background server in advance and stored in the local memory, so that the sample face image is prevented from being acquired from the background server every time the model is updated, the flow consumption and the pressure of the background server can be reduced, the updating time of the characteristic value is shortened, and the use experience of a user is improved.
Specifically, the step I comprises the following steps:
step I1, extracting the characteristics of the sample face image pre-stored in the local memory, and detecting whether a sample face image with characteristic extraction failure exists;
if not, executing step I21, and taking the extracted characteristic value as a new characteristic value;
if yes, executing step I22, taking the extracted feature value as a first feature value, and sending a corresponding image resetting request to the background server based on the sample face image with failed extraction;
step I23, receiving the sample face reset image returned by the background server, and performing feature extraction on the sample face reset image to obtain a second feature value, wherein the new feature value comprises the first feature value and the second feature value.
In this embodiment, feature extraction is performed on a sample face image stored in a local memory in advance, and whether a sample face image with a failure in feature extraction exists is detected.
And if the characteristic value does not exist, taking the extracted characteristic value as a new characteristic value.
If the extracted characteristic value exists, the extracted characteristic value is used as a first characteristic value, and a corresponding image resetting request is sent to a background server based on the sample face image which is unsuccessfully extracted, so that the background server reminds a corresponding user to re-input the sample face image and return the sample face image to the access control equipment; and then, receiving a sample face reset image returned by the background server, and performing feature extraction on the sample face reset image to obtain a second feature value, wherein the new feature value comprises the first feature value and the second feature value.
In this embodiment, whether the model is updated or not is determined by comparing the model version number obtained by the application memory with the locally stored model version number, and when the model is updated, the sample face image pre-stored in the local memory is extracted to obtain a new feature value for subsequent face recognition comparison. Through the mode, the sample face image obtained by downloading from the background server is stored in the local memory in advance, and then when the model is updated, only the characteristic value extraction is needed to be carried out on the sample face image, and the full amount of sample face image is not needed to be obtained from the background server at each time, so that the flow consumption and the pressure of the background server can be reduced, the updating time of the characteristic value is shortened, and the use experience of a user is improved.
Furthermore, considering the situations that the algorithm model cannot be used temporarily when the algorithm model is updated, the recognition accuracy of different algorithm models is different in different scenes, and the like, multiple sets of algorithm models are often set in the face brushing application, and accordingly multiple algorithm modules need to be set up. Because the face recognition includes a plurality of processes, such as face detection, live body detection, feature value extraction and comparison, and correspondingly, each algorithm module includes a plurality of methods, when an algorithm is switched, mixed calling of methods between different algorithm models is easy to occur, for example, when an algorithm B is switched to an algorithm a, a face detection method of the algorithm a and a live body detection method of the algorithm B may be called, and a bug may occur in a program. That is to say, in the existing algorithm switching process, different algorithm modules are often coupled to each other, which may cause a phenomenon that two algorithm models operate simultaneously.
In view of the above, a fifth embodiment of the door access control method according to the present invention is provided based on the first to third embodiments.
In this embodiment, the access control method further includes:
step J, when an algorithm switching request is received, acquiring a target switching algorithm according to the algorithm switching request;
in this embodiment, when a plurality of sets of algorithm models are included in the face brushing application, when an algorithm switching request is received, a target switching algorithm is obtained according to the algorithm switching request. The triggering manner of the algorithm handover request may include, but is not limited to: 1) when the current algorithm model is detected to be updated, automatic triggering is carried out; 2) when the recognition accuracy is lower than a preset value, automatic triggering is carried out; 3) the user is triggered by the corresponding software or program.
And K, updating the current algorithm mark of the preset intermediate layer to the algorithm mark corresponding to the target switching algorithm, and calling the algorithm module of the target switching algorithm based on the updated algorithm mark.
Then, the current algorithm mark of the preset middle layer is updated to the algorithm mark corresponding to the target switching algorithm, and the algorithm module of the target switching algorithm is called based on the updated algorithm mark. The preset intermediate layer is pre-established and used for providing an interface for a caller, the interface function is consistent with the interface function of each algorithm, and the interface parameters are a union set of the parameters of each algorithm. In addition, a mark for calling the algorithm type is arranged in the preset middle layer, and an interface for calling the algorithm can be arranged in the interface according to the algorithm mark.
In this embodiment, an intermediate layer architecture, that is, a preset intermediate layer, is introduced into the existing code architecture, and when algorithm switching is performed, only the current algorithm flag of the preset intermediate layer needs to be updated, and a corresponding algorithm can be called based on the updated algorithm flag, so as to implement algorithm switching. By the method, the algorithm is switched each time without considering the internal details of each algorithm interface, and only the algorithm marks of the preset intermediate layer are needed to be updated and the methods exposed by the respective algorithm modules are called; the internal calling details of each specific algorithm are completed by each algorithm module, so that the coupling between the specific algorithm module and a caller can be greatly released, algorithm switching is easily realized, and only one algorithm is ensured to run all the time.
Further, based on the fifth embodiment, a sixth embodiment of the access control method of the present invention is provided.
In this embodiment, the access control method further includes:
step L, when an algorithm modification request is received, obtaining a modification type and an algorithm to be modified according to the algorithm modification request;
in the embodiment, by introducing the middle layer framework, the algorithm is added or removed or the internal implementation of a certain algorithm is changed in the later period, and only the modification is carried out in a specific algorithm module, so that the calling is not influenced, and the maintenance cost caused by the internal change of the algorithm can be greatly reduced.
Specifically, when an algorithm modification request is received, a modification type and an algorithm to be modified are obtained according to the algorithm modification request, wherein the modification type includes deletion, addition or modification, and the algorithm to be modified is an algorithm which needs to be modified by a user.
Step M, if the modification type is deletion, deleting the algorithm module corresponding to the algorithm to be modified, and deleting the algorithm mark corresponding to the algorithm to be modified in the preset intermediate layer;
and if the modification type is deletion, deleting the algorithm module corresponding to the algorithm to be modified, and deleting the algorithm mark corresponding to the algorithm to be modified in the preset intermediate layer. In addition, the interface parameters in the preset intermediate layer can be updated according to the algorithm to be modified, that is, the non-union interface parameters between the algorithm to be modified and other algorithms are deleted. Certainly, when the algorithm is deleted, the interface parameters of the preset middle layer are not updated, and the subsequent algorithm calling is not influenced.
And N, if the modification type is increased, adding an algorithm module corresponding to the algorithm to be modified, adding an algorithm mark corresponding to the algorithm to be modified in the preset middle layer, and adding a parameter corresponding to the algorithm to be modified in an interface parameter of the preset middle layer.
If the modification type is increased, adding an algorithm module corresponding to the algorithm to be modified, and adding an algorithm mark corresponding to the algorithm to be modified in the preset intermediate layer so as to facilitate subsequent algorithm switching, and meanwhile, adding parameters corresponding to the algorithm to be modified in interface parameters of the preset intermediate layer.
Further, if the modification type is modification, modification information can be obtained according to the algorithm modification request, so that the algorithm module of the algorithm to be modified is correspondingly modified according to the modification information.
In the embodiment, an intermediate layer architecture, namely a preset intermediate layer, is introduced into the existing code architecture, and when an algorithm is modified, only corresponding algorithm modules need to be added or deleted or modified, and relevant parameters (such as algorithm labels and interface parameters) of the preset intermediate layer need to be modified, and specific changes of each algorithm module do not need to be concerned, so that the maintenance and development are very convenient, and the maintenance cost caused by internal changes of the algorithm can be greatly reduced.
The invention also provides an access control management device.
Referring to fig. 4, fig. 4 is a functional module schematic diagram of a first embodiment of the access control device of the present invention.
As shown in fig. 4, the access control device includes:
the data generating module 10 is configured to generate face brushing data corresponding to a face brushing event when the face brushing event is detected;
the data caching module 20 is configured to cache the face brushing data in a local memory, and upload the face brushing data to a background server;
the state monitoring module 30 is configured to stop uploading the face brushing data when detecting that the communication connection between the access control device and the background server is disconnected, and monitor the communication connection state of the access control device in a timed or real-time manner;
and the rescaling uploading module 40 is configured to rescale the face brushing data from the local memory and continue to upload the data when detecting that the communication connection is reestablished.
Further, the data generating module 10 is further configured to:
when a face brushing event is detected, executing a face brushing data generation task through a preset storage thread to obtain face brushing data corresponding to the face brushing event;
the data caching module 20 is further configured to:
caching the face brushing data into a local memory through the preset storage thread, and sending uploading information corresponding to the face brushing event to a preset sending thread, so that the face brushing data is called through the preset sending thread based on the uploading information and uploaded to a background server;
the retuning upload module 40 is further configured to:
and when the communication connection is detected to be reestablished, waking up the preset sending thread, recalling the face brushing data from the local memory, and continuously uploading the face brushing data.
Further, the face brushing data includes a face brushing image and detail information, and the access control device further includes:
the first judgment module is used for acquiring a first residual storage space of the local memory at regular time or in real time and judging whether the first residual storage space is smaller than a preset threshold value or not;
the first deleting module is used for deleting the face brushing images according to the face brushing time if the first residual storage space is smaller than the preset threshold value so as to keep the latest face brushing images with a first preset number;
the second judgment module is used for acquiring a second residual storage space of the local memory after the first deletion is completed, and judging whether the second residual storage space is smaller than the preset threshold value or not;
the second deleting module is used for deleting the retained latest face brushing image if the second residual storage space is smaller than the preset threshold;
a third determining module, configured to obtain a third remaining storage space of the local memory after the second deletion is completed, and determine whether the third remaining storage space is smaller than the preset threshold;
and the third deleting module is used for deleting the detail information according to the face brushing time if the third remaining storage space is smaller than the preset threshold value so as to keep a second preset number of latest detail information.
Further, entrance guard management device still includes:
the first obtaining module is used for obtaining a first model version number of the face brushing application and obtaining a second model version number stored in the local memory when the cold start of the face brushing application is detected;
the detection module is used for detecting whether the first model version number is consistent with the second model version number;
and the first updating module is used for extracting the characteristics of the sample face image pre-stored in the local memory to obtain a new characteristic value and updating the version number of the second model into the version number of the first model if the two are not consistent.
Further, the update module is specifically configured to:
extracting the characteristics of the sample face image pre-stored in the local memory, and detecting whether the sample face image with the characteristic extraction failure exists;
if the characteristic value does not exist, the extracted characteristic value is used as a new characteristic value;
if the extracted characteristic value exists, the extracted characteristic value is used as a first characteristic value, and a corresponding image resetting request is sent to the background server based on the sample face image which is unsuccessfully extracted;
and receiving a sample face reset image returned by the background server, and performing feature extraction on the sample face reset image to obtain a second feature value, wherein the new feature value comprises the first feature value and the second feature value.
Further, entrance guard management device still includes:
the second acquisition module is used for acquiring a target switching algorithm according to the algorithm switching request when the algorithm switching request is received;
and the second updating module is used for updating the current algorithm mark of the preset middle layer to the algorithm mark corresponding to the target switching algorithm, and calling the algorithm module of the target switching algorithm based on the updated algorithm mark.
Further, entrance guard management device still includes:
the third acquisition module is used for acquiring a modification type and an algorithm to be modified according to the algorithm modification request when the algorithm modification request is received;
a fourth deleting module, configured to delete the algorithm module corresponding to the algorithm to be modified and delete the algorithm flag corresponding to the algorithm to be modified in the preset intermediate layer if the modification type is deletion;
and the adding module is used for adding the algorithm module corresponding to the algorithm to be modified if the modification type is increased, adding the algorithm mark corresponding to the algorithm to be modified in the preset intermediate layer, and adding the parameter corresponding to the algorithm to be modified in the interface parameter of the preset intermediate layer.
The function implementation of each module in the access control management device corresponds to each step in the access control management method embodiment, and the function and implementation process are not described in detail herein.
The present invention also provides a computer-readable storage medium, on which an access control management program is stored, and when being executed by a processor, the access control management program implements the steps of the access control management method according to any one of the above embodiments.
The specific embodiment of the computer-readable storage medium of the present invention is substantially the same as the embodiments of the above-mentioned access control method, and is not described herein again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. An access control management method is characterized by comprising the following steps:
when a face brushing event is detected, generating face brushing data corresponding to the face brushing event;
caching the face brushing data into a local memory, and uploading the face brushing data to a background server;
when the fact that the communication connection between the access control equipment and the background server is disconnected is detected, the face brushing data is stopped being uploaded, and the communication connection state of the access control equipment is monitored in a timed or real-time mode;
and when the communication connection is detected to be reestablished, recalling the face brushing data from the local memory and continuously uploading the face brushing data.
2. The access control management method according to claim 1, wherein the step of generating the face brushing data corresponding to the face brushing event when the face brushing event is detected comprises:
when a face brushing event is detected, executing a face brushing data generation task through a preset storage thread to obtain face brushing data corresponding to the face brushing event;
the step of caching the face brushing data into a local memory and uploading the face brushing data to a background server comprises the following steps:
caching the face brushing data into a local memory through the preset storage thread, and sending uploading information corresponding to the face brushing event to a preset sending thread, so that the face brushing data is called through the preset sending thread based on the uploading information and uploaded to a background server;
when the communication connection is detected to be reestablished, the step of recalling the face brushing data from the local memory and continuously uploading the face brushing data comprises the following steps:
and when the communication connection is detected to be reestablished, waking up the preset sending thread, recalling the face brushing data from the local memory, and continuously uploading the face brushing data.
3. The access control management method according to claim 1, wherein the face brushing data includes a face brushing image and detail information, and the access control management method further includes:
acquiring a first residual storage space of the local memory at regular time or in real time, and judging whether the first residual storage space is smaller than a preset threshold value or not;
if the first residual storage space is smaller than the preset threshold, deleting the face brushing images according to the face brushing time so as to keep the latest face brushing images with a first preset number;
after the first deletion is completed, acquiring a second residual storage space of the local memory, and judging whether the second residual storage space is smaller than the preset threshold value;
if the second remaining storage space is smaller than the preset threshold, deleting the retained latest face brushing image;
after the second deletion is completed, acquiring a third remaining storage space of the local memory, and judging whether the third remaining storage space is smaller than the preset threshold value;
and if the third remaining storage space is smaller than the preset threshold, deleting the detail information according to the face brushing time so as to keep a second preset number of latest detail information.
4. The access control management method according to any one of claims 1 to 3, further comprising:
when detecting that the face brushing application is cold started, acquiring a first model version number of the face brushing application, and acquiring a second model version number stored in the local memory;
detecting whether the first model version number is consistent with the second model version number;
and if the model face images are not consistent, extracting the features of the sample face images pre-stored in the local memory to obtain a new feature value, and updating the version number of the second model into the version number of the first model.
5. The access control management method according to claim 4, wherein the step of extracting the features of the sample face image pre-stored in the local memory to obtain a new feature value comprises:
extracting the characteristics of the sample face image pre-stored in the local memory, and detecting whether the sample face image with the characteristic extraction failure exists;
if the characteristic value does not exist, the extracted characteristic value is used as a new characteristic value;
if the extracted characteristic value exists, the extracted characteristic value is used as a first characteristic value, and a corresponding image resetting request is sent to the background server based on the sample face image which is unsuccessfully extracted;
and receiving a sample face reset image returned by the background server, and performing feature extraction on the sample face reset image to obtain a second feature value, wherein the new feature value comprises the first feature value and the second feature value.
6. The access control management method according to any one of claims 1 to 3, further comprising:
when an algorithm switching request is received, acquiring a target switching algorithm according to the algorithm switching request;
and updating the current algorithm mark of the preset intermediate layer to the algorithm mark corresponding to the target switching algorithm, and calling the algorithm module of the target switching algorithm based on the updated algorithm mark.
7. The access control management method of claim 6, further comprising:
when an algorithm modification request is received, obtaining a modification type and an algorithm to be modified according to the algorithm modification request;
if the modification type is deletion, deleting the algorithm module corresponding to the algorithm to be modified, and deleting the algorithm mark corresponding to the algorithm to be modified in the preset intermediate layer;
if the modification type is increased, adding an algorithm module corresponding to the algorithm to be modified, adding an algorithm mark corresponding to the algorithm to be modified in the preset intermediate layer, and adding a parameter corresponding to the algorithm to be modified in an interface parameter of the preset intermediate layer.
8. The utility model provides an entrance guard management device which characterized in that, entrance guard management device includes:
the data generation module is used for generating face brushing data corresponding to the face brushing event when the face brushing event is detected;
the data caching module is used for caching the face brushing data into a local memory and uploading the face brushing data to a background server;
the state monitoring module is used for stopping uploading the face brushing data when the fact that the communication connection between the access control equipment and the background server is disconnected is detected, and monitoring the communication connection state of the access control equipment in a timed or real-time mode;
and the readjustment uploading module is used for readjusting the face brushing data from the local memory and continuously uploading the face brushing data when the communication connection reestablishment is detected.
9. An access control device, characterized in that the access control device comprises: a memory, a processor and a door access management program stored on the memory and operable on the processor, the door access management program when executed by the processor implementing the steps of the door access management method according to any one of claims 1 to 7.
10. A computer-readable storage medium, wherein a door access management program is stored on the computer-readable storage medium, and when executed by a processor, the method according to any one of claims 1 to 7 is implemented.
CN202011000481.8A 2020-09-21 2020-09-21 Access control management method and device, access control equipment and computer readable storage medium Pending CN112164169A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011000481.8A CN112164169A (en) 2020-09-21 2020-09-21 Access control management method and device, access control equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011000481.8A CN112164169A (en) 2020-09-21 2020-09-21 Access control management method and device, access control equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN112164169A true CN112164169A (en) 2021-01-01

Family

ID=73863274

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011000481.8A Pending CN112164169A (en) 2020-09-21 2020-09-21 Access control management method and device, access control equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN112164169A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113112670A (en) * 2021-04-26 2021-07-13 厦门熵基科技有限公司 Access control method and device, electronic equipment and storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105430480A (en) * 2015-11-13 2016-03-23 Tcl集团股份有限公司 Method and system for storing video data
CN107071005A (en) * 2017-03-24 2017-08-18 厦门中控生物识别信息技术有限公司 A kind of method of data synchronization and system
US20180240293A1 (en) * 2016-01-26 2018-08-23 Acsys Ip Holding Inc. Systems and methods for remote access rights and verification
CN108447194A (en) * 2018-05-28 2018-08-24 天津融信金安科技有限公司 A kind of ATM protective cabins intelligent protection system and method
CN109325462A (en) * 2018-10-11 2019-02-12 深圳斐视沃德科技有限公司 Recognition of face biopsy method and device based on iris
CN109615750A (en) * 2018-12-29 2019-04-12 深圳市多度科技有限公司 The recognition of face control method and device of door access machine, access control equipment, storage medium
CN110458154A (en) * 2019-09-12 2019-11-15 腾讯科技(深圳)有限公司 Face identification method, device and computer readable storage medium
CN111047729A (en) * 2019-12-30 2020-04-21 重庆能工科技发展有限公司 Attendance system and method based on intelligent access control
CN111260798A (en) * 2020-01-09 2020-06-09 中国铁道科学研究院集团有限公司电子计算技术研究所 Gate based on face recognition, control method thereof and gate verification system
CN111489471A (en) * 2020-03-10 2020-08-04 深圳市海威达科技有限公司 Cloud-based one-card identification equipment authentication method
CN111652058A (en) * 2020-04-27 2020-09-11 青岛百灵信息科技股份有限公司 Computer face recognition device

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105430480A (en) * 2015-11-13 2016-03-23 Tcl集团股份有限公司 Method and system for storing video data
US20180240293A1 (en) * 2016-01-26 2018-08-23 Acsys Ip Holding Inc. Systems and methods for remote access rights and verification
CN107071005A (en) * 2017-03-24 2017-08-18 厦门中控生物识别信息技术有限公司 A kind of method of data synchronization and system
CN108447194A (en) * 2018-05-28 2018-08-24 天津融信金安科技有限公司 A kind of ATM protective cabins intelligent protection system and method
CN109325462A (en) * 2018-10-11 2019-02-12 深圳斐视沃德科技有限公司 Recognition of face biopsy method and device based on iris
CN109615750A (en) * 2018-12-29 2019-04-12 深圳市多度科技有限公司 The recognition of face control method and device of door access machine, access control equipment, storage medium
CN110458154A (en) * 2019-09-12 2019-11-15 腾讯科技(深圳)有限公司 Face identification method, device and computer readable storage medium
CN111047729A (en) * 2019-12-30 2020-04-21 重庆能工科技发展有限公司 Attendance system and method based on intelligent access control
CN111260798A (en) * 2020-01-09 2020-06-09 中国铁道科学研究院集团有限公司电子计算技术研究所 Gate based on face recognition, control method thereof and gate verification system
CN111489471A (en) * 2020-03-10 2020-08-04 深圳市海威达科技有限公司 Cloud-based one-card identification equipment authentication method
CN111652058A (en) * 2020-04-27 2020-09-11 青岛百灵信息科技股份有限公司 Computer face recognition device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113112670A (en) * 2021-04-26 2021-07-13 厦门熵基科技有限公司 Access control method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110610610B (en) Vehicle access management method and device and storage medium
CN111143163A (en) Data monitoring method and device, computer equipment and storage medium
CN112017323B (en) Inspection alarm method and device, readable storage medium and terminal equipment
CN106209412B (en) Resource monitoring system and method thereof
CN113835985A (en) Method, device and equipment for monitoring and analyzing cause of stuck
CN110674149B (en) Service data processing method and device, computer equipment and storage medium
CN111835799A (en) Automatic acquisition system and method for vehicle log
CN111367828A (en) Memory compression method, device, terminal and storage medium
CN112164169A (en) Access control management method and device, access control equipment and computer readable storage medium
CN112036242A (en) Face picture acquisition method and device, computer equipment and storage medium
CN109327499B (en) Service interface management method and device, storage medium and terminal
CN110659272A (en) Data cleaning method and system
CN109308778B (en) Mobile detection alarm method, device, acquisition equipment and storage medium
CN110163183B (en) Target detection algorithm evaluation method and device, computer equipment and storage medium
CN110019372B (en) Data monitoring method, device, server and storage medium
CN111263113A (en) Data packet sending method and device and data packet processing method and device
CN116028246A (en) Scheduling method, system, computer equipment and storage medium for data processing
JP2007233495A (en) Distributed image processor
CN112437274B (en) Transmission method of snapshot picture and snapshot machine
CN113438286B (en) Information pushing method and device, electronic equipment and storage medium
CN110765932B (en) Scene change sensing method
CN111552612A (en) MSSQL monitoring management method, management device, system and computer equipment
CN115082911A (en) Video analysis method and device and video processing equipment
CN114969839A (en) Log obtaining method and device, storage medium and terminal
CN110718285B (en) Data archiving method, system, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210101