CN113744439A - Wisdom safety inspection floodgate machine system - Google Patents

Wisdom safety inspection floodgate machine system Download PDF

Info

Publication number
CN113744439A
CN113744439A CN202010460363.9A CN202010460363A CN113744439A CN 113744439 A CN113744439 A CN 113744439A CN 202010460363 A CN202010460363 A CN 202010460363A CN 113744439 A CN113744439 A CN 113744439A
Authority
CN
China
Prior art keywords
security
authentication
information
gate
security gate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010460363.9A
Other languages
Chinese (zh)
Inventor
张俊明
李碧丹
田之进
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
PCI Suntek Technology Co Ltd
PCI Technology and Service Co Ltd
Original Assignee
PCI Suntek Technology Co Ltd
PCI Technology and Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PCI Suntek Technology Co Ltd, PCI Technology and Service Co Ltd filed Critical PCI Suntek Technology Co Ltd
Priority to CN202010460363.9A priority Critical patent/CN113744439A/en
Publication of CN113744439A publication Critical patent/CN113744439A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/10Movable barriers with registering means
    • G07C9/15Movable barriers with registering means with arrangements to prevent the passage of more than one individual at a time
    • EFIXED CONSTRUCTIONS
    • E01CONSTRUCTION OF ROADS, RAILWAYS, OR BRIDGES
    • E01FADDITIONAL WORK, SUCH AS EQUIPPING ROADS OR THE CONSTRUCTION OF PLATFORMS, HELICOPTER LANDING STAGES, SIGNS, SNOW FENCES, OR THE LIKE
    • E01F13/00Arrangements for obstructing or restricting traffic, e.g. gates, barricades ; Preventing passage of vehicles of selected category or dimensions
    • E01F13/04Arrangements for obstructing or restricting traffic, e.g. gates, barricades ; Preventing passage of vehicles of selected category or dimensions movable to allow or prevent passage
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01VGEOPHYSICS; GRAVITATIONAL MEASUREMENTS; DETECTING MASSES OR OBJECTS; TAGS
    • G01V9/00Prospecting or detecting by methods not provided for in groups G01V1/00 - G01V8/00
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Landscapes

  • Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computing Systems (AREA)
  • Artificial Intelligence (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • General Health & Medical Sciences (AREA)
  • Molecular Biology (AREA)
  • Biomedical Technology (AREA)
  • General Engineering & Computer Science (AREA)
  • Biophysics (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Life Sciences & Earth Sciences (AREA)
  • Geophysics (AREA)
  • Architecture (AREA)
  • Civil Engineering (AREA)
  • Structural Engineering (AREA)
  • Human Computer Interaction (AREA)
  • Alarm Systems (AREA)

Abstract

The embodiment of the application discloses wisdom safety inspection floodgate machine system. According to the technical scheme provided by the embodiment of the application, the information processor is in signal connection with the authentication processor, the security inspection door, the image tracker and the security inspection gate, and the information processor is used for performing passing authorization according to an authentication request processing result of the authentication processor, a dangerous goods detection result of the security inspection door and an identification tracking result of the image tracker, and controlling the security inspection gate to be opened or kept in a closed state. By adopting the technical means, the information processor can synthesize the identity authentication result and the dangerous goods detection result to carry out passing authorization, and carry out identification and tracking of passing personnel through the image tracker, so that the phenomenon of system omission caused by replacement and trailing is avoided, the security inspection efficiency and the passing efficiency of the system are further improved, a security inspector is not required to participate in the field, and the labor cost of security inspection is reduced.

Description

Wisdom safety inspection floodgate machine system
Technical Field
The embodiment of the application relates to the technical field of security inspection, and especially relates to an intelligent security inspection gate system.
Background
In the daily operation process of rail transit, its entry all can set up the security check system, and the security check system includes security check door, luggage security check machine etc.. The security inspection door detects whether the passenger carries dangerous goods such as metal, and the luggage security inspection machine detects whether the passenger bag carries the dangerous goods. This approach is relatively slow and does not allow detection of passenger identity information. Therefore, in the existing quick subway security check mode, the identity information is registered in advance through a passenger, when the passenger subsequently carries out bus security check, if the passenger does not have a large bag, the passenger can pass through the security check door after passing through face recognition, the passenger who alarms at the security check door is manually checked by a security checker, and then the qualified passenger passes through an AFC security check gate machine for ticket checking and passing through the gate. The whole security check process is short, and the passing efficiency of security check is relatively high.
However, when the security inspection system performs rapid security inspection, displacement and trailing situations are easy to occur in the face recognition process, so that some passers can pass through the gate without identity authentication, the system frequently fails to inspect, the field security inspector has heavy load, and the security inspection efficiency is relatively low.
Disclosure of Invention
The embodiment of the application provides an wisdom security check floodgate machine system, can improve the security check efficiency and the current efficiency of system, reduces the risk of missing examining.
The embodiment of the application provides an wisdom safety inspection floodgate machine system, includes: the system comprises an information processor, an authentication processor, a security check door, an image tracker and a security check gate;
the authentication processor is used for processing an authentication request of a passer;
the safety inspection door is used for detecting dangerous goods of passers-by;
the image tracker is used for identifying and tracking the passers;
the information processor is in signal connection with the authentication processor, the security inspection door, the image tracker and the security inspection gate and is used for performing passing authorization according to an authentication request processing result of the authentication processor, a dangerous goods detection result of the security inspection door and an identification tracking result of the image tracker and controlling the security inspection gate to be opened or kept in a closed state.
Preferably, the intelligent traffic control system further comprises a channel side door which is in signal connection with the information processor and used for providing an exit for passers who fail in passing authorization.
Preferably, the authentication processor comprises biometric identification means and/or physical medium identification means.
Preferably, the authentication processor further comprises a first passage indicating unit for indicating whether a passer-by is allowed to enter the security gate.
Preferably, the image tracker includes video collector, video collector corresponds the security check passageway of wisdom security check floodgate machine system is shot, the security check passageway includes authentication request waiting area, authentication district, security check door district, security check floodgate machine entry waiting area, security check floodgate machine passageway and security check floodgate machine export district.
Preferably, the video collector comprises a first video collector and a second video collector.
Preferably, the fields of view of the first and second video collectors overlap.
Preferably, the first video collector is arranged at the entrance of a security inspection channel of the intelligent security inspection gate system, and the second video collector is arranged at the exit of the security inspection channel of the intelligent security inspection gate system.
Preferably, the video collector is arranged at the top of a security check channel of the intelligent security check gate system.
Preferably, the security inspection gate is further provided with a second passing indication unit for indicating passing authorization results of passing personnel and corresponding passing exit information.
Preferably, the second traffic indication unit comprises an information display screen and/or an acousto-optic indicator.
The intelligent security inspection gate system provided by the embodiment of the application is connected with the authentication processor, the security inspection door, the image tracker and the security inspection gate through the information processor, and controls the security inspection gate to be opened or kept in a closed state through the information processor according to the authentication request processing result of the authentication processor, the dangerous goods detection result of the security inspection door and the identification tracking result of the image tracker. By adopting the technical means, the information processor can comprehensively carry out passing authorization on the passers according to the identity authentication result and the dangerous goods detection result of the passers, and carry out identification tracking on the passers through the image tracker, so that the phenomenon of system omission caused by displacement, trailing and the like is avoided, the security inspection efficiency and the passing efficiency of the system are further improved, the security inspector is not required to participate in the site, and the labor cost of security inspection is reduced.
In addition, this application embodiment shunts the passerby who passes through the authorization failure through the passageway side door, can avoid the passerby who passes through the authorization failure to return from the security check passageway and lead to the condition of passageway jam, further improves the current efficiency of system, optimizes passerby's the current experience of security check
Drawings
FIG. 1 is a schematic diagram of a system connection of an intelligent security gate according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of an intelligent security gate system according to an embodiment of the present disclosure;
fig. 3 is a schematic diagram of a backward structure of an intelligent security gate system in an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, specific embodiments of the present application will be described in detail with reference to the accompanying drawings. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be further noted that, for the convenience of description, only some but not all of the relevant portions of the present application are shown in the drawings. The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that all other embodiments obtained by a person of ordinary skill in the art without any creative effort based on the embodiments of the present application belong to the protection scope of the present application. In the embodiments of the present application, the orientation or positional relationship indicated by the related terms is based on the orientation or positional relationship shown in the drawings. These terms are used primarily to better describe the present application and its embodiments, and are not used to limit the indicated devices, elements or components to a particular orientation or to be constructed and operated in a particular orientation. Moreover, some of the above terms may be used to indicate other meanings besides the orientation or positional relationship, for example, the term "on" may also be used to indicate some kind of attachment or connection relationship in some cases. The specific meaning of these terms in this application will be understood by those of ordinary skill in the art as appropriate. Furthermore, the terms "mounted," "disposed," "provided," "connected," and "connected" are to be construed broadly. For example, it may be a fixed connection, a removable connection, or a unitary construction; can be a mechanical connection, or an electrical connection; may be directly connected, or indirectly connected through intervening media, or may be in internal communication between two devices, elements or components. The specific meaning of the above terms in the present application can be understood by those of ordinary skill in the art as appropriate. Furthermore, the terms "first," "second," and the like, are used primarily to distinguish one device, element, or component from another (the specific nature and configuration may be the same or different), and are not used to indicate or imply the relative importance or number of the indicated devices, elements, or components. "plurality" means two or more unless otherwise specified.
The application provides an wisdom security check floodgate machine system aims at integrating links such as authentication, safety inspection and current control through in the track traffic operation scene, uses single gate floodgate machine as the security check floodgate machine, carries out authentication, dangerous goods, contraband security check and current control to passerby. And the passers-by are dynamically tracked in real time, so that the condition that the system is missed to be checked due to trailing, displacement and the like is prevented, and the security check efficiency and the passing efficiency of the system are improved. For traditional track traffic safety inspection system, its authentication, safety inspection and current control are independent operation usually, and the module is not interrelated between the module, and authentication, safety inspection and current control can't realize current control through the mode of single gate, and the passerby all need carry out once when carrying out the safety inspection authentication and comparing through every gate authorizing, and whole process is relatively more complicated, and the current experience of safety inspection is relatively poor. And adopt the mode of traditional quick security check, though can carry out authentication and accomplish safety inspection fast through face identification, this kind of mode is after carrying out authentication, if the condition that passerby replaces or follows appears, and the system can't accurate perception, and the personnel that can't guarantee to pass through the security check floodgate is exactly the personnel that obtain the authorization of passing, has latent hourglass to examine the risk, and whole security check process needs the on-the-spot participation of security check person, and the security check cost of labor is higher relatively. Based on this, provide wisdom security check floodgate machine system of this application embodiment to solve current security check system and detect that the flow is complicated, the missed checking phenomenon is frequent, the technical problem that the security check cost of labor is high.
Example (b):
fig. 1 is a schematic connection diagram of an intelligent security gate system according to an embodiment of the present application, and referring to fig. 1, the intelligent security gate system specifically includes: an information processor 11, an authentication processor 12, a security gate 13, an image tracker 14, and a security gate 15; the authentication processor 12 is used for processing an authentication request of a passer; the security inspection door 13 is used for detecting dangerous goods of passers-by; the image tracker 14 is used for identifying and tracking the passing personnel; the information processor 11 is in signal connection with the authentication processor 12, the security door 13, the image tracker 14 and the security gate 15, and is configured to perform passage authorization according to an authentication request processing result of the authentication processor 12, a dangerous goods detection result of the security door 13 and an identification tracking result of the image tracker 14, and control the security gate 15 to be opened or kept closed.
The intelligent security inspection gate system can be widely applied to occasions needing security inspection control passing, such as rail transit, exhibition hall scenic spots and security units. The authentication processor 12, the security check door 13 and the security check gate 15 are integrally arranged, so that the identity authentication of passers-by, the detection of dangerous goods and the passing control of passing authorization can be completed through the security check gate 15. Through carrying out effectual integration processing with passerby's identity information, security check information and security check floodgate machine current information, carry out traffic control according to the processing result, when guaranteeing the security check quality, promoted current efficiency and current experience. Generally, the authentication processor 12, the security gate 13, the image tracker 14 and the security gate 15 are all disposed along a security passage of the intelligent security gate system, and the security gate 15 is typically disposed at an exit of the security passage for passing gate passing control of a passerby after completing security inspection. The security inspection channel comprises an authentication request waiting area, an identity authentication area, a security inspection door area, a security inspection gate entrance waiting area, a security inspection gate channel and a security inspection gate exit area. The information processor 11 is used as a control center of the system, is in signal connection with the authentication processor 12, the security gate 13, the image tracker 14 and the security gate 15, receives an authentication request or an identity authentication result of the authentication processor 12, a dangerous article detection result of the security gate 13 and an identification tracking result of the image tracker 14 in real time, judges whether the current passer-by permits the passing based on the result data, and if the passing is permitted, the information processor 11 performs passing authorization, and at this time, the information processor 11 controls the security gate 15 to be opened. On the contrary, if the passing is not allowed, the pass authorization fails, and at this time, the information processor 11 controls the security check gate 15 to keep the closed state. It is understood that when either or both of the identification result of the passer and the dangerous goods detection result fail, the passer is not allowed to pass through the gate. And, according to the recognition and tracking result of the image tracker 14, if the passer-by is found to be changed (possibly caused by displacement, trailing and the like) in the current security inspection process, the passer-by is not allowed to pass through the gate. Only when the identity authentication result and the dangerous goods detection result pass, the safety inspection is qualified, and the identity of the passer-by is not changed, the information processor 11 allows the passer-by to pass the brake and controls the safety inspection brake 15 to be opened. It should be noted that, when performing the authentication processing, the authentication processor 12 obtains the identity authentication request of the passer by identifying the biometric features or the physical media of the passer, and further sends the identity authentication request to the information processor 11 to complete the identity authentication or directly completes the identity authentication at the authentication processor 12. For example, in a scenario of performing identity authentication using an IC card, the authentication processor 12 generally directly identifies the IC card information of the authorized person and directly performs identity authentication locally to obtain a corresponding identity authentication result, and the identity authentication result is sent to the information processor 11 for further processing. And corresponding to the scene of performing identity authentication such as face recognition, the face image of the passer needs to be acquired by the authentication processor 12, and the face image is further sent to the information processor 11 as authentication request information to perform face comparison, so as to complete identity authentication of the passer, obtain a corresponding identity authentication result, and the scene of performing identity authentication by using other biological characteristics such as finger veins is also a similar processing flow. In addition, the information processor 11, the authentication processor 12, and the image tracker 14 according to the embodiment of the present application may be respectively composed of one entity or a plurality of entities according to actual needs.
For example, when the intelligent security gate system of the embodiment of the present application performs the traffic inspection, after a passer enters the security inspection channel, the image tracker 14 starts to track the passer, and performs real-time identification and tracking on the passer based on the target detection identification. And further triggers the authentication processor 12 to begin processing the authentication request of the passing person. In one embodiment, the authentication processor 12 may also be triggered to identify the passer's biometric or physical medium when the passer enters the authentication range of the authentication processor 12 by providing an infrared ranging sensor at the authentication processor 12. And further triggers the image tracker 14 to perform recognition tracking on the pedestrian. After the authentication processor 12 is triggered, an authentication request of the passer is collected, and the essence of the authentication request is biometric information or physical medium information (two-dimensional code, IC card information, or the like) of the passer. The authentication processor 12 may locally process the authentication request based on the received authentication request to generate a corresponding authentication processing result, or may transmit the authentication request to the information processor 11 to perform the authentication processing. When identity authentication is performed, identification authentication is performed corresponding to authentication information pre-stored by a passer, and the identification mode is biological characteristic identification, physical medium identification and the like. After the passer-by is authenticated, if the authentication is passed, the passer-by can be allowed to go into the security inspection door 13 through the acousto-optic prompt. On the contrary, if the authentication is not passed, the sound and light prompt is given to the passer-by to not allow the passer-by to go into the security gate 13. In one embodiment, if another passer-by is performing security inspection in the security inspection door 13 at this time, the passer-by who has passed the identity authentication is also prompted by sound and light to temporarily disallow access to the security inspection door 13, and the passer-by needs to wait for the previous passer-by to enter the security inspection door 13 after completing the security inspection. Specifically, three different indicator lights of green, yellow and red can be adopted to prompt the light corresponding to three conditions of allowing, temporarily disallowing and disallowing the passerby to enter the security inspection door 13, so that the passerby can be intuitively informed, long and short tones with different frequencies can be used for prompting the passerby, or voice is directly adopted for prompting and the like. Further, after the passerby walks into the security inspection door 13, the security inspection door 13 detects dangerous goods, and the security inspection door 13 sends the detection result of the dangerous goods to the information processor 11. The information processor 11, based on the result of the dangerous goods detection and the result of the identity authentication, does not allow the current passer to pass if any result fails, and further finally determines whether the passer is allowed to pass according to the result of the identification and tracking if both results pass. In the whole passing process of the passerby in the security inspection channel, the image tracker 14 continuously identifies and tracks the passerby, and sends the real-time identification and tracking result to the information processor 11. The information processor 11 determines whether the identity of the passer is changed based on the identification tracking result when the dangerous goods detection result and the identity authentication result pass and the security check is qualified, and controls the security check gate 15 to open if the identity of the passer is not changed, so as to allow the passer to pass through the security check gate 15. Otherwise, if the situation that the passer-by is replaced or followed is judged according to the identification tracking result, the security check gate 15 is controlled to be kept in a closed state, the current passer-by is failed in passing authorization, and the passer-by is not allowed to pass through the security check gate 15.
Further, the image tracker 14 can determine whether displacement and trailing phenomena occur in the passer according to the identity authentication result of the authentication processor 12 when performing the identification tracking of the passer. Wherein, the authentication processor 12 determines the identity authentication result after the authentication request processing for the passer-by is performed by the information processor 11. At this time, if the authentication is passed, the information processor 11 transmits the authentication result and the corresponding pedestrian information to the image tracker 14. The image tracker 14 can determine which passer-by passes the identity authentication according to the identity authentication result and the corresponding passer-by information. And according to the identification and tracking of the passers in the security inspection channel, if the passers who do not pass the identity authentication or the identity authentication are found, the current missed inspection condition such as displacement or trailing is determined, the image tracker 14 sends the identification and tracking result to the information processor 11, and the corresponding passers are judged to fail the passing authorization based on the identification and tracking result, so that the security inspection gate 15 is not allowed to pass.
Specifically, referring to fig. 2 to fig. 3, a schematic structural diagram of the intelligent security gate system according to the embodiment of the present application is provided, in the embodiment of the present application, the intelligent security gate system further includes a channel side door 16, and the channel side door 16 is in signal connection with the information processor 11, and is used for providing an exit for passers who fail to pass authorization. The channel side door 16 is arranged on one side of the security check gate 15, when the information processor 11 judges that the current passing authorization of the passing personnel fails according to the identity authentication result of the authentication processor 12, the dangerous goods detection result of the security check gate 13 and the identification tracking result of the image tracker 14, and the passing personnel is not allowed to pass through the security check gate 15, the information processor 11 controls the channel side door 16 to be opened at the moment, the passing personnel corresponding to the passing authorization failure exit from the channel side door 16, so that the passing personnel who fail in the passing authorization can be prevented from returning from the security check channel, personnel backflow in the security check channel is caused, the channel congestion condition is caused, and the security check passing efficiency of the system is further improved. And, when the pass authorization fails, the system can provide corresponding prompt information to prompt passers to fail the pass authorization and instruct the passers to exit the passage from the passage side door 16. It should be noted that in the present embodiment, the security gate 15 is in the form of a double-shot gate, and the aisle-side door 16 is in the form of a single-shot gate. In practical application, the security gate 15 and the passage side door 16 can adopt different arrangement forms according to actual needs.
Further, the authentication processor 12 of the embodiment of the present application includes a biometric recognition device and/or a physical medium recognition device, which may be a face recognition device, a fingerprint recognition device, an iris recognition device, a barcode recognition device and/or a radio frequency recognition device. At present, in the security inspection passage control process, the identity authentication mode of the passage personnel is generally realized by adopting a card swiping mode, a face recognition mode and/or a code scanning recognition mode. Correspondingly, the identity authentication of the passer can be performed by adopting a face recognition device, a code scanning recognition device and/or a radio frequency recognition device. It should be noted that, before performing identity authentication, a passer-by needs to complete personal information registration in advance, and upload personal authentication information to the system, so that a subsequent system performs identity authentication according to the authentication information. Taking the face recognition device to perform identity authentication as an example, as shown in fig. 2, the face recognition device 121 is disposed at an entrance of the security inspection channel, and performs identity authentication on a passer-by who enters the security inspection channel in real time. The face recognition device 121 includes a camera and a display screen, the camera is used for collecting face images, and the display screen is used for indicating a passer to adjust the position, so that the camera collects complete face images. The passer-by uploads the personal face information in advance during registration and authentication. Subsequently, when the face recognition device 121 performs face recognition, the face information of the currently-passing person is collected on site, the collected face information is uploaded to the information processor 11, and the face information stored in the system in advance is compared by the information processor 11 to generate a corresponding identity authentication result. At this time, if the system has the matched face information, the identity authentication is passed, otherwise, the identity authentication is not passed. According to the identity authentication result generated in real time, the face recognition device 121 may further perform identity authentication result prompting. In practical applications, after the identity authentication of the face recognition device 121 is passed, the person is further prompted to pass the authentication through a display screen and/or a sound and light prompt. Otherwise, prompting the passer to fail authentication.
Specifically, the authentication processor 12 further includes a first passage indicating unit 122 for indicating whether a passage person is allowed to enter the security door 13. The first passing indication unit 122 is an indication lamp and/or a speaker, which is disposed at a corresponding position of the security inspection passage according to actual requirements, and indicates whether a passer-by allows to enter the security inspection door 13 to complete the security inspection of the next step. It is understood that when the passer-by person passes the authentication and no other passer-by person performs the security check in the security check door 13, the first passage indicating unit 122 indicates that the passer-by person allows the access to the security check door 13. If there are other passers in the security door 13, the first passage indicating unit 122 prompts the passer to temporarily disallow entry into the security door 13, and wait for the previous passer to exit from the security door 13 and then enter. In the case where the passer-by identity authentication is not passed, the first passage indicating unit 122 indicates that the passer is not allowed to enter the security door 13. The first passage indicating unit 122 can adopt a green light, a yellow light and a red light to indicate the three different information indications, so that a passer can be intuitively informed whether to allow the passer to enter the security inspection door 13 currently, and the security inspection passing experience of the passer is optimized.
Further, the image tracker 14 includes a video collector, and the video collector photographs corresponding to the security check channel of the intelligent security check gate system. The video collector carries out target identification tracking on corresponding passers based on the video image data by collecting the video image data of the security check channel. Specifically, the video collector includes a first video collector 141 and a second video collector 142 with overlapped viewing areas, the first video collector 141 is disposed at an entrance of a security inspection channel of the intelligent security inspection gate system, and the second video collector 142 is disposed at an exit of the security inspection channel of the intelligent security inspection gate system. The video collector is arranged at the top of a security check channel of the intelligent security check gate system. The video collector is arranged at a corresponding position to shoot the security check channel in a mode of overlapping view fields. Compared with a mode of carrying out target identification and tracking by adopting a single camera, the embodiment of the application adopts the video collectors with overlapped multiple groups of vision fields to carry out target identification and tracking, can enlarge the identification and tracking range of the image tracker 14, facilitates the algorithm to carry out target identification and matching of different video collectors, and has better identification and tracking effects on passers-by. In addition, in the embodiment of the application, the two video collectors are respectively arranged at the inlet and the outlet of the security inspection channel, so that the identification tracking range of the passers-by is expanded to the maximum extent, and the identification tracking effect of the passers-by is optimized. Two video collectors set up in the top of safety inspection passageway, and it shoots the field of vision better relatively, can avoid the condition that passerby sheltered from each other or the barrier shelters from, and the noise of the video image data of ensureing to gather is less relatively, further optimizes passerby's discernment tracking effect. It should be noted that, because video collector locates the top, in order to avoid sheltering from, then the top of security inspection door 13 generally sets up for the fretwork or sets up to avoid sheltering from as far as possible to guarantee video collector's video acquisition field of vision, avoid influencing the target identification tracking to passerby.
In one embodiment, the plurality of video collectors may also be set without overlapping the viewing areas, each video collector performs video collection corresponding to its respective partition, and further determines the position of the previous monitored target in the next video collector by using a pedestrian re-identification algorithm, thereby implementing identification and tracking of the passers-by.
More specifically, in the embodiment of the present application, the security gate 15 is further provided with a second passage indication unit, which is used for indicating a passage authorization result of a passage person. After the information processor 11 performs the passing authorization processing according to the identity authentication result of the authentication processor, the dangerous goods detection result of the security gate 13 and the identification tracking result of the image tracker 14, if the passing authorization is successful, the second passing indication unit prompts that the passing personnel passes the passing authorization successfully, and the passing is allowed through the security gate 15. On the contrary, if the passing authorization fails, the second passing indicating unit prompts the passing personnel that the passing authorization fails, the passing personnel cannot pass through the security check gate 15, and at the moment, the passing personnel need to exit the security check channel through the channel side door 16. Specifically, the second traffic indication unit includes an information display screen 151 and/or an acoustic-optical indicator 152. As shown in fig. 2, in the embodiment of the present application, the information display screen 151 is arranged to prompt the result of the authorization for passage of the current passer in real time. In addition, the information display screen 151 may also indicate the passers to pass through the gate from the security gate 15 or exit the security gate through the gate side door 16 according to different passing authorization results. Different passing directions can be displayed to indicate the passing personnel to pass through the corresponding gate. The information display screen 151 is arranged at the joint of the security inspection gate and the channel side door and obliquely arranged relative to the security inspection gate 15 and the channel side door 16 so as to visually indicate the passing direction of the passing personnel. When the sound-light indicator 152 is used for indicating the passing authorization result, the sound-light indicator 152 can comprise a red indicator light and a green indicator light, according to the passing authorization result, if the passing authorization is successful, the green light is displayed, and the sound prompts the passers that the current passing authorization is successful and the passers pass through the security check gate; if the pass authorization fails, a red light is displayed, and the sound prompts passers to fail in the current pass authorization and exit from the side door of the channel. Therefore, the current passing authorization result of the passer can be intuitively informed, and the security check passing experience of the passer is optimized. In addition, the information display screen 151 may also synchronously display the face images corresponding to the persons who pass or fail the authorization, further indicating the identity information of the persons who pass or fail the authorization, for example, in case of trailing passing, the face image of the trailing person may be synchronously displayed on the information display screen 151, so as to clearly indicate that the corresponding person exits from the side door 16.
In addition, the security inspection door 13 of the embodiment of the present application includes a metal detection device and a corresponding detection indication unit, and the detection indication unit is used for indicating a detection result of the metal detection device. Metal detecting device carries out the hazardous articles (be contraband article promptly, generally be control cutter etc.) through the passerby who gets into security check door 13 and detects, if detect the hazardous articles, then show through surveying the on-the-spot light of indicating unit and carried the hazardous articles at present, information processor 11 can upload this alarm information and video in real time to station management platform and inform the security check personnel, the security check personnel can call on-the-spot video image and confirm or hurry to the on-the-spot processing, with this security check management that can optimize station security check personnel, realize the networking, integrate, unmanned on duty etc, further promote security check efficiency.
More specifically, in the embodiment of the present application, the image tracker 14 may perform recognition and tracking on the passers by using an algorithm such as YOLOv3 target detection, and determine the corresponding passers as the monitoring target. After the monitoring target is detected, the position of the monitoring target is predicted and tracked by a target tracker (such as a target tracker based on a siemese _ fc target tracking algorithm) so as to realize image recognition and tracking of the monitoring target.
When the image tracker 14 tracks the images of the monitored targets, one target tracker is allocated to each monitored target, the predicted position of each monitored target in the next frame of image information is obtained through the target trackers, then the detected position and the predicted position of each monitored target are paired one by one through Hungary matching to form a tracking fragment corresponding to each monitored target, the tracking fragments of the same monitored target are combined to form a tracking chain, and multi-target tracking in a monitored area is achieved. Further, whether the monitoring target enters the monitoring area or not is judged according to the position of the monitoring target in the image information. The division of the monitoring area in the image information may be determined according to the installation position and posture of the imaging device of the image tracker 14, and the waiting area and the security inspection passage area of the monitoring area may be determined in the image information by image recognition or manual demarcation. Further, after it is determined that the monitoring target enters the monitoring area, a target ID is assigned to the monitoring target entered in the monitoring area. The target ID may be assigned based on a set ID assignment or randomly generated. In other embodiments, the target ID assignment to the monitoring target may be performed when the monitoring target is detected, that is, the target ID is assigned to each monitoring target in the image information.
After the monitored target is authenticated by the authentication processor 12, the information processor 11 receives the authentication result, and sends the result data to the image tracker 14, and the image tracker 14 determines the monitored target corresponding to the authentication result (for example, the monitored target closest to the corresponding security gate or the authorization request module), and authorizes the target ID of the monitored target. After the target ID is authorized, the monitoring target in the security inspection channel area is continuously monitored according to the image tracking result, and the authorization condition of the target ID of the monitoring target in the security inspection channel area is continuously judged so as to judge whether unauthorized people (the monitoring target with the target ID not authorized) exist in the security inspection channel area.
Further, when an unauthorized object ID is detected in the monitored object of the passage area, passage monitoring data indicating the presence of an unauthorized person in the passage area is generated, and this passage monitoring data is sent to the information processor 11 as the result of the identification tracking by the image tracker 14. If an unauthorized object ID is not detected, the authorization of the object ID of the monitoring object in the security check passage area is continuously detected. After detecting an unauthorized object ID in the monitoring object of the security check passage area and generating passage monitoring data indicating the presence of an unauthorized person in the passage area, the information processor 11 controls the security check gate 15 to remain in a closed state in response to the passage monitoring data of the identification tracking result, and further opens the passage side door 16 to let the unauthorized person exit the security check passage from the passage side door 16. Moreover, it should be noted that when the security check gate 15 opens the passer who succeeds in passing authorization, it is further determined whether there is a passer who fails in passing authorization in the current security check channel, and if it is determined that there is a passer who fails in passing authorization in the current security check channel, the security check gate 15 may not temporarily open the door to the passer who succeeds in passing authorization. The system firstly prompts the passers who fail to pass the authorization, and after the passers exit from the side door of the channel, the system can pass the passers who pass the authorization successfully, ask the passers who pass the authorization successfully to wait for a while and supervise the unqualified passers to exit from the side door.
The image tracking and the target ID distribution of the passer-by are started before the passer-by enters the security inspection channel, when the authentication processor 12 or the information processor 11 authenticates the identity of the passer-by, the target ID of the passer-by is authorized, whether unauthorized persons exist in the security inspection channel region is determined according to the authorization condition of the target ID of the passer-by in the security inspection channel region, when the unauthorized persons exist in the security inspection channel region, the security inspection gate machine 15 is controlled to be kept in a closed state, the passer-by is not allowed to pass the gate, and cheating behaviors such as trailing and imposition are discovered in time, so that the cheating prevention effect of the system on the security inspection channel is improved, and the missing inspection risk of the system is avoided.
On the basis that the image tracker 14 performs target tracking and identification on the passer, the embodiment of the application provides another target identification and tracking method for the passer. For example, after the monitoring target corresponding to the passenger in the video image is identified, the characteristic information of each monitoring target is confirmed. The characteristic information may be one or more of the combination of target body type (such as head type, hair style, shoulder width, etc.), clothing, carrying object, gait, walking pace, time stamp, etc. The feature information may be obtained based on an existing target detection technology, such as a neural network based on deep learning, a Scale-invariant feature transform (SIFT) algorithm, and the like, which is not limited in this embodiment.
In the present embodiment, the image tracker 14 captures different monitoring ranges through different video collectors, and there is a characteristic docking area in the adjacent monitoring range, through which the monitoring target passes when moving from one monitoring range to another monitoring range. Because the two video collectors have an overlapping area, the image information generated by shooting has the overlapping area. Illustratively, according to the characteristic information of each monitoring target, the monitoring targets of the two pieces of image information in the characteristic butt joint area are subjected to target information matching, so that the same monitoring target in different pieces of image information is confirmed, and the condition that the monitoring target is lost or misplaced when the monitoring target passes through security inspection channels with different lengths is guaranteed. The monitoring target information matching can match two pieces of characteristic information, when the number of the matched characteristic information reaches a preset matching number requirement, the two corresponding monitoring targets are considered to be the same person, the monitoring targets correspond to the same target ID in different image information, and the target IDs of the monitoring targets are kept unchanged when the monitoring targets move from one monitoring range to another monitoring range.
Specifically, the step of matching the target information with the plurality of image information based on the feature information to confirm the same monitoring target in different image information includes steps S10-S30:
s10: determining a feature docking area of the plurality of image information, the feature docking area comprising an overlapping area and/or a non-overlapping area.
Wherein the feature docking area comprises an overlapping area and/or a non-overlapping area. An overlapping region is understood to be a region in which the views of adjacent monitoring areas are identical or overlap, the image information corresponding to both monitoring areas appearing simultaneously in the overlapping region during the movement of the monitoring object from one monitoring area to the other and passing through the overlapping region. The non-overlapping region is understood to be a non-overlapping transition region between adjacent monitoring ranges, and when a monitoring target moves from one monitoring range to another monitoring range and passes through the non-overlapping region, the monitoring target does not appear in the image information corresponding to the two monitoring ranges, that is, the monitoring target will disappear from the previous image information in the direction of the non-overlapping region and will appear from the non-overlapping region to the next image information.
Specifically, a characteristic docking area between image information captured by a plurality of different image capturing devices is determined and the type of the characteristic docking area is determined. It is understood that one image information may correspond to a plurality of feature docking areas.
Alternatively, the determination of the overlapping area and the non-overlapping area may be automatically or manually determined according to the mounting position, the mounting angle, and the monitoring range of the image pickup device. For example, the overlap area is determined by defining a feature butt area based on image information captured by each imaging device or by matching the overlap area by a feature point matching algorithm.
S20: and estimating the moving position of the monitoring target according to the traffic pace based on the non-overlapping areas of the plurality of image information, and performing target information matching based on the moving position to confirm the same monitoring target in the non-overlapping areas by different image information.
Specifically, for the non-overlapping area of a plurality of image information adjacent to each other in the monitoring range, when the monitoring target enters the non-overlapping area, the target information matching cannot be performed on the two image information according to the characteristic information such as the body type, the clothing, the carried object, and the gait of the target. The time and the position of the monitoring target in the next image information after passing through the non-overlapping area can be estimated according to the passing pace and the position of the monitoring target in the previous image information, so that the same monitoring target of different image information in the non-overlapping area is confirmed, and the condition that the monitoring target is lost or misplaced when the monitoring target passes through the non-overlapping area is ensured not to occur. Optionally, the traffic pace of the monitoring target may be calculated according to the moving distance and the time stamp of the monitoring target in the image information.
S30: and performing target information matching on the overlapping areas of the plurality of image information according to the characteristic information based on the overlapping areas of the plurality of image information to confirm the same monitoring target of different image information in the overlapping areas.
For example, for an overlapping area of a plurality of image information adjacent to each other in the monitoring range, since the monitoring target appears in the plurality of image information at the same time when the monitoring target enters the overlapping area, target information matching can be performed on the two image information according to the characteristic information of the target body type, clothing, carrying objects, gait, and the like.
Specifically, when the target information of the overlapping area is matched, the image information corresponding to the shooting angle of view is traced back according to the timestamp based on the overlapping area of the plurality of image information. Specifically, before matching the target information in the overlapping area for the image information captured by different image capturing devices (taking two image information having the overlapping area as an example), the previous image information having the corresponding capturing angle of view to the capturing angle of the next image information (that is, the same or similar capturing angle of view) is traced back in reverse according to the timestamp, and the target information matching in the next step is performed based on the plurality of image information corresponding to the capturing angle of view. It can be understood that the shooting angles of the same monitored target in the image information corresponding to the shooting angle are closer, and at the moment, the characteristic information of the monitored target in different image information is closer, so that the accuracy of target information matching is effectively improved. It should be explained that the previous image information and the next image information in this embodiment are understood as image information obtained by two adjacent image capturing devices in the monitored area. Optionally, the time length corresponding to the reverse tracing of the image information corresponding to each camera is determined according to the installation position and the installation angle of the camera.
Further, according to the characteristic information of a plurality of image information corresponding to the shooting visual angle and based on the priority level of the characteristic information, the target information matching is carried out on the plurality of image information so as to confirm the same monitoring target of different image information in the overlapping area. Specifically, the feature information of each monitoring target in the plurality of image information corresponding to the shooting angle is acquired, and the plurality of feature information of each pair of image information is matched between different image information. Specifically, when image information is matched, according to the priority levels of different pieces of feature information, the feature information of two pieces of image information is sequentially matched according to the sequence of the priority levels from high to low, when a target matching condition is met, the matching of the current set of image information target information is considered to be successful, the matching of the next set of feature information is carried out, otherwise, the matching of the current set of image information target information is considered to be failed, and the matching of the next set of feature information is carried out.
Further, after the monitoring targets in the plurality of image information are successfully matched, the same monitoring target matched in the plurality of image information is made to share the same target ID to confirm the same monitoring target in the overlapping area of different image information. Optionally, the target matching condition may be to determine the number of types of feature information that needs to be successfully matched according to priority levels of different feature information, and it may be understood that the higher the priority level is, the fewer types of feature information that need to be successfully matched are. After the corresponding amount of feature information is successfully matched, the corresponding group of image information target information is considered to be successfully matched, and the next group of feature information can be matched.
For example, assuming that the priority levels of the target body type, the clothing, the carried object and the gait are sequentially reduced, after the target body type is successfully matched, the target information is considered to be successfully matched, and the matching of the next group of feature information can be performed; otherwise, continuing to match the clothing with the carried object, considering that the target information is successfully matched after the clothing and the carried object are successfully matched, and matching the next group of characteristic information; otherwise, continuing the matching of other characteristic information until all the characteristic information is matched.
Then, pass authorization is performed on the target ID passed through the security check according to the information processor 11, and the security check gate 15 is notified to allow the opening of the target ID. And on the other hand, whether the monitoring target of the unauthorized target ID exists in the passage area or not is judged, and passage indication information for indicating whether unauthorized people exist in the passage area or not is output.
The information processor is in signal connection with the authentication processor, the security inspection door, the image tracker and the security inspection gate, and controls the security inspection gate to be opened or kept closed according to the passing authorization of the information processor according to the identity authentication result of the authentication processor, the dangerous goods detection result of the security inspection door and the identification tracking result of the image tracker. By adopting the technical means, the information processor can synthesize the identity authentication result and the dangerous goods detection result to carry out passing authorization of the passing personnel, and carry out identification tracking on the passing personnel through the image tracker, so that the phenomenon of system missing detection caused by replacement and trailing is avoided, and the security inspection efficiency and the passing efficiency of the system are improved.
In addition, this application embodiment shunts the passerby of the failed authorization through the passageway side door, can avoid the passerby of the failed authorization of passing to return from the security check passageway and lead to the condition of passageway jam, further improves the current efficiency of system, optimizes the passerby's the current experience of security check.
The foregoing is considered as illustrative of the preferred embodiments of the invention and the technical principles employed. The present application is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present application has been described in more detail with reference to the above embodiments, the present application is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present application, and the scope of the present application is determined by the scope of the claims.

Claims (11)

1. An intelligent security gate system, comprising: the system comprises an information processor, an authentication processor, a security check door, an image tracker and a security check gate;
the authentication processor is used for processing an authentication request of a passer;
the safety inspection door is used for detecting dangerous goods of passers-by;
the image tracker is used for identifying and tracking the passers;
the information processor is in signal connection with the authentication processor, the security inspection door, the image tracker and the security inspection gate and is used for performing passing authorization according to an authentication request processing result of the authentication processor, a dangerous goods detection result of the security inspection door and an identification tracking result of the image tracker and controlling the security inspection gate to be opened or kept in a closed state.
2. The intelligent security gate system of claim 1, further comprising a gate side door in signal communication with the information processor for providing an exit for passers who fail the authorization to pass.
3. The intelligent security gate system of claim 1, wherein the authentication processor comprises a biometric device and/or a physical media identification device.
4. The intelligent security gate system of claim 3, wherein the authentication processor further comprises a first pass indication unit for indicating whether a passer is allowed to enter the security gate.
5. The intelligent security gate system of claim 1, wherein the image tracker comprises a video collector, the video collector photographs corresponding to a security gate of the intelligent security gate system, and the security gate comprises an authentication request waiting area, an identity authentication area, a security gate entrance waiting area, a security gate passage and a security gate exit area.
6. The intelligent security gate system of claim 5, wherein the video collector comprises a first video collector and a second video collector.
7. The intelligent security gate system of claim 6, wherein the fields of view of the first and second video collectors overlap.
8. The intelligent security gate system of claim 6, wherein the first video collector is disposed at an entrance of a security gate of the intelligent security gate system, and the second video collector is disposed at an exit of the security gate of the intelligent security gate system.
9. The intelligent security gate system of claim 5, wherein the video collector is disposed at the top of a security channel of the intelligent security gate system.
10. The intelligent security gate system of claim 1, wherein the security gate is further provided with a second passage indication unit for indicating the result of the authorization of passage of the passer and the corresponding information of the exit.
11. The intelligent security gate system of claim 10, wherein the second pass indication unit comprises an information display screen and/or an audible and/or visual indicator.
CN202010460363.9A 2020-05-27 2020-05-27 Wisdom safety inspection floodgate machine system Pending CN113744439A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010460363.9A CN113744439A (en) 2020-05-27 2020-05-27 Wisdom safety inspection floodgate machine system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010460363.9A CN113744439A (en) 2020-05-27 2020-05-27 Wisdom safety inspection floodgate machine system

Publications (1)

Publication Number Publication Date
CN113744439A true CN113744439A (en) 2021-12-03

Family

ID=78723688

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010460363.9A Pending CN113744439A (en) 2020-05-27 2020-05-27 Wisdom safety inspection floodgate machine system

Country Status (1)

Country Link
CN (1) CN113744439A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115035641A (en) * 2022-04-26 2022-09-09 今创集团股份有限公司 Intelligent passenger arrival management system for subway station and safety inspection method thereof
CN115116174A (en) * 2022-06-29 2022-09-27 中铁第四勘察设计院集团有限公司 System and method for automatically acquiring pass health code based on user authorization information
CN115116175A (en) * 2022-06-29 2022-09-27 中铁第四勘察设计院集团有限公司 Epidemic prevention detection system and method based on fusion of various identity information
CN115123313A (en) * 2022-06-29 2022-09-30 今创集团股份有限公司 Overall layout of rapid station-entering inspection area of urban railway station
CN115659302A (en) * 2022-09-22 2023-01-31 北京睿家科技有限公司 Method and device for determining missed-detection person, electronic equipment and storage medium

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115035641A (en) * 2022-04-26 2022-09-09 今创集团股份有限公司 Intelligent passenger arrival management system for subway station and safety inspection method thereof
CN115116174A (en) * 2022-06-29 2022-09-27 中铁第四勘察设计院集团有限公司 System and method for automatically acquiring pass health code based on user authorization information
CN115116175A (en) * 2022-06-29 2022-09-27 中铁第四勘察设计院集团有限公司 Epidemic prevention detection system and method based on fusion of various identity information
CN115123313A (en) * 2022-06-29 2022-09-30 今创集团股份有限公司 Overall layout of rapid station-entering inspection area of urban railway station
CN115659302A (en) * 2022-09-22 2023-01-31 北京睿家科技有限公司 Method and device for determining missed-detection person, electronic equipment and storage medium
CN115659302B (en) * 2022-09-22 2023-07-14 北京睿家科技有限公司 Method and device for determining missing detection personnel, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN113744439A (en) Wisdom safety inspection floodgate machine system
CN211979734U (en) Wisdom safety inspection floodgate machine system
US9875392B2 (en) System and method for face capture and matching
CN110379050A (en) A kind of gate control method, apparatus and system
US7382895B2 (en) Tailgating and reverse entry detection, alarm, recording and prevention using machine vision
JP4357521B2 (en) Unauthorized passing person detection device and unauthorized passing person recording system using the same
JP2007148987A (en) Face authentication system, and entrance and exit management system
KR101492799B1 (en) Entrance control integrated video recording system and method thereof
CN110930569B (en) Security check control method and system
EP2546807B1 (en) Traffic monitoring device
KR20150137666A (en) Security optical turnstile system
JP2008158678A (en) Person authentication device, person authentication method and access control system
JP4617286B2 (en) Unauthorized passing person detection device and unauthorized passing person recording system using the same
JP3664784B2 (en) Wide area monitoring device
KR102309106B1 (en) Situation linkage type image analysis device
KR102046591B1 (en) Image Monitoring System and Method for Monitoring Image
KR102002287B1 (en) Management system of entrance and exit
JP2010067008A (en) Imaging management system, imaging management method, authentication system, and authentication method
JP2004118359A (en) Figure recognizing device, figure recognizing method and passing controller
CN113744443B (en) Gate channel anti-cheating control method, device, equipment and storage medium
JPH1132322A (en) Automatic tracing system for possessor of dangerous weapon
CN114639216A (en) Specific personnel track area analysis early warning system and method
TWI467517B (en) Access control system and method for vehicles
TWM461270U (en) Vehicle entry and exist system
KR20230114650A (en) Integrity entrance management apparatus using image and method for unmanned space

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination