CN114187696A - Personnel access detection method, device, equipment and storage medium - Google Patents

Personnel access detection method, device, equipment and storage medium Download PDF

Info

Publication number
CN114187696A
CN114187696A CN202111496653.XA CN202111496653A CN114187696A CN 114187696 A CN114187696 A CN 114187696A CN 202111496653 A CN202111496653 A CN 202111496653A CN 114187696 A CN114187696 A CN 114187696A
Authority
CN
China
Prior art keywords
detected
information
person
personnel
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111496653.XA
Other languages
Chinese (zh)
Other versions
CN114187696B (en
Inventor
李晓广
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Softcom Smart Information Technology Co ltd
Original Assignee
Softcom Smart Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Softcom Smart Information Technology Co ltd filed Critical Softcom Smart Information Technology Co ltd
Priority to CN202111496653.XA priority Critical patent/CN114187696B/en
Publication of CN114187696A publication Critical patent/CN114187696A/en
Application granted granted Critical
Publication of CN114187696B publication Critical patent/CN114187696B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Abstract

The embodiment of the application discloses a person access detection method, a person access detection device, a person access detection equipment and a person access detection storage medium. Wherein, the method comprises the following steps: acquiring current user information of a person to be detected; judging whether the personnel to be detected passes information authentication or not based on a preset information management library according to the current user information; if yes, judging whether the personnel to be detected is located in a preset blacklist personnel management library or not according to the current user information; and if not, determining that the in-out detection of the personnel to be detected passes. The embodiment of the application realizes automatic personnel access detection, and improves the detection accuracy and the detection efficiency.

Description

Personnel access detection method, device, equipment and storage medium
Technical Field
The embodiment of the application relates to the technical field of data processing, in particular to a method, a device, equipment and a storage medium for detecting personnel entrance and exit.
Background
In the daily business of entry and exit management, each frontier needs to strictly detect the relevant persons entering and exiting, so as to ensure the safety of the persons entering and exiting, and avoid the adverse effects of the social environment caused by the entry and exiting of the relevant persons violating regulations or using fake certification materials.
The existing entry and exit business management usually needs the personnel of the frontier to carry out screening management, and the safety detection of the relevant entry and exit personnel can not be carried out automatically. The frontier inspects whether the entry and exit personnel meet the entry and exit standard one by one, the detection efficiency is low, the manual judgment is inaccurate, and the detection precision is influenced.
Disclosure of Invention
The embodiment of the application provides a person access detection method, a person access detection device and a storage medium, so that automatic person access detection is realized, and the detection accuracy and the detection efficiency are improved.
In a first aspect, an embodiment of the present application provides a method for detecting person entry and exit, where the method includes:
acquiring current user information of a person to be detected;
judging whether the personnel to be detected passes information authentication or not based on a preset information management library according to the current user information;
if yes, judging whether the personnel to be detected is located in a preset blacklist personnel management library or not according to the current user information;
and if not, determining that the in-out detection of the personnel to be detected passes.
In a second aspect, an embodiment of the present application further provides a device for detecting entry and exit of people, where the device includes:
the information acquisition module is used for acquiring the current user information of the personnel to be detected;
the information authentication judging module is used for judging whether the personnel to be detected passes the information authentication or not based on a preset information management library according to the current user information;
the blacklist personnel judgment module is used for judging whether the personnel to be detected is located in a preset blacklist personnel management library or not according to the current user information if the personnel to be detected passes the information authentication;
and the access detection determining module is used for determining that the access detection of the personnel to be detected passes if the personnel to be detected is not located in a preset blacklist personnel management library.
In a third aspect, an embodiment of the present application further provides an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor executes the program to implement the person entry and exit detection method according to any one of the embodiments of the present application.
In a fourth aspect, the present application further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the person entry and exit detection method according to any one of the embodiments of the present application.
The method comprises the steps of obtaining current user information of a person to be detected; judging whether the person to be detected passes information authentication or not based on a preset information management library according to the current user information; if yes, judging whether the personnel to be detected is located in a preset blacklist personnel management library or not according to the current user information; and if not, determining that the in-out detection of the person to be detected passes. According to the scheme, the mode that whether the person to be detected passes the information authentication or not and whether the person to be detected is located in the blacklist person management library or not is judged, multiple times of automatic detection of the person to be detected is achieved, information screening is conducted step by step, the detection efficiency and the detection accuracy are improved, and the situation that the social or related persons are lost due to inaccurate manual judgment is avoided.
Drawings
Fig. 1 is a schematic flow chart illustrating a method for detecting entrance and exit of a person in an embodiment of the present application;
fig. 2 is a schematic flow chart illustrating a method for detecting entrance and exit of people in the second embodiment of the present application;
fig. 3 is a schematic flow chart illustrating a method for detecting entrance and exit of people in the third embodiment of the present application;
fig. 4 is a block diagram of a device for detecting entrance and exit of people in the fourth embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device in a fifth embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be further noted that, for the convenience of description, only some of the structures related to the present application are shown in the drawings, not all of the structures.
Example one
Fig. 1 is a schematic flow chart of a method for detecting entrance and exit of people according to an embodiment of the present disclosure, where the present embodiment is applicable to a situation of security detection of an entrance and exit person, the method may be executed by a device for detecting entrance and exit of people, and the device may be implemented in a software and/or hardware manner, as shown in fig. 1, the method specifically includes the following steps:
and S110, acquiring the current user information of the personnel to be detected.
The personnel to be detected can be the personnel who enter and exit at present; the current user information may include at least one of a user name, a mobile phone number, an in-out time validity period, and the like. The valid period of the current user departure/arrival time may be a valid period of a flight time for the current user to depart or enter. After the valid period of the outbound or inbound flight time of the current user is acquired, whether the current time is within the time range of the valid period of the outbound or inbound flight time of the current user can be judged, and if yes, the verification of the outbound or inbound flight time of the user is passed; if not, the verification of the user access time validity period is not passed.
For example, the current user information may be obtained through manual input by the current user, or through scanning of a personalized document of the current user by a scanning device, where the personalized document may be a passport, an airline ticket, or the like, and the scanning device may be a scanner, or the like.
And S120, judging whether the person to be detected passes the information authentication or not based on a preset information management library according to the current user information.
The information management library may be preset by a relevant technician, for example, the information management library may be a called third-party library, or may be a personal information library preset by the relevant technician; in order to ensure timeliness and accuracy of information authentication, the information management library can be updated regularly according to actual requirements.
The information authentication may be verification of personal information of the person to be detected. For example, whether the obtained current user information is consistent with the current user information input in the information management library or not can be judged based on a preset information management library according to the current user information, and if yes, the information authentication of the person to be detected is determined to be passed; and if not, determining that the information authentication of the personnel to be detected is not passed.
In an optional embodiment, the current user information includes coded information of the person to be detected, and correspondingly, according to the current user information, based on a preset information management library, the determining whether the person to be detected passes information authentication includes: and judging whether the coded information of the person to be detected is located in a preset information management library, and if so, determining that the person to be detected passes the information authentication.
The coded information can comprise unique identification coded information, access certificate coded information and the like of the personnel to be detected; the unique identification code information can be code information used for representing the unique identity of the person to be detected, and the access certificate code information can be code information of a passport and/or an air ticket of the person to be detected. The encoded information can also include an encoded validity period, wherein the encoded validity period can include the uniquely identifying encoded validity period and the access certificate encoded validity period.
Judging whether the coded information of the personnel to be detected is located in a preset information management library, if so, further judging whether the current time is within the coding validity period of the coded information of the personnel to be detected; and if the coded information of the person to be detected is not located in the preset information management library, the information authentication of the person to be detected is not passed. If the current time is within the code valid period time of the code information of the person to be detected, the information authentication of the person to be detected is passed; and if the current time is not within the code valid period time of the code information of the person to be detected, the information authentication of the person to be detected is not passed.
For example, whether the unique identification code information of the person to be detected is located in a preset information management library is judged, and if yes, whether the current time is within the validity period of the unique identification code of the person to be detected can be further judged; if the unique identification code identification information of the person to be detected is not located in the preset information management library, the authentication of the unique identification code information of the person to be detected is not passed, and a message prompt of 'your certificate verification is not passed' can be displayed to the person to be detected. If the current time is within the valid period of the unique identification code of the person to be detected, the authentication of the unique identification code information of the person to be detected is passed, and if the current time is not within the valid period of the unique identification code information of the person to be detected, the authentication of the unique identification code information of the person to be detected is not passed, and a message prompt that 'your certificate is invalid' can be displayed to the person to be detected.
For another example, whether the access card coding information of the person to be detected is located in a preset information management library is judged, and if yes, whether the current time is within the validity period of the access card coding of the person to be detected can be further judged; if the access card coding information of the person to be detected is not located in the preset information management library, the authentication of the access card coding information of the person to be detected is not passed, and a message prompt of 'your passport and/or air ticket verification failed' can be displayed to the person to be detected. If the current time is within the validity period of the entrance and exit certificate code of the person to be detected, the authentication of the entrance and exit certificate code information of the person to be detected is passed, and if the current time is not within the validity period of the entrance and exit certificate code of the person to be detected, the authentication of the entrance and exit certificate code information of the person to be detected is not passed, and a message prompt that 'your passport and/or air ticket is invalid' can be displayed to the person to be detected.
If the only code identification information and the identification and access code information in the coded information of the personnel to be detected are authenticated, the information authentication of the personnel to be detected can be determined to be passed. In the optional embodiment, whether the coded information of the person to be detected is located in the preset information management library is judged, and if yes, the person to be detected is determined to pass the information authentication. According to the scheme, the accuracy and the safety of the information authentication of the personnel to be detected are improved by authenticating the coded information of the personnel to be detected.
And S130, if yes, judging whether the personnel to be detected is located in a preset blacklist personnel management library or not according to the current user information.
The blacklist personnel management library can be a third party library for calling other platform permissions, or a blacklist personnel library constructed in advance by related technical personnel. In order to ensure timeliness and accuracy of blacklist personnel authentication, the blacklist personnel management library can be regularly updated according to actual requirements.
Exemplarily, if the to-be-detected person passes the information authentication, judging whether the to-be-detected person is located in a management library of blacklist persons according to the current user information; if yes, prompting a message that 'you are prohibited to pass' to the person to be detected, displaying personal information, archive information, case association information, social information and the like of the person to be detected, starting an alarm, and informing related workers of field processing.
And S140, if not, determining that the entrance and exit detection of the person to be detected passes.
For example, if the person to be detected is not located in the preset blacklist person management library, it is determined that the entrance and exit detection of the person to be detected passes, and the person to be detected is allowed to exit and/or enter.
The method comprises the steps of obtaining current user information of a person to be detected; judging whether the person to be detected passes information authentication or not based on a preset information management library according to the current user information; if yes, judging whether the personnel to be detected is located in a preset blacklist personnel management library or not according to the current user information; and if not, determining that the in-out detection of the person to be detected passes. According to the scheme, the mode that whether the person to be detected passes the information authentication or not and whether the person to be detected is located in the blacklist person management library or not is judged, multiple times of automatic detection of the person to be detected is achieved, information screening is conducted step by step, the detection efficiency and the detection accuracy are improved, and the situation that the social or related persons are lost due to inaccurate manual judgment is avoided.
Example two
Fig. 2 is a schematic flow chart of a method for detecting entrance and exit of a person according to the second embodiment of the present application, which is optimized and improved based on the foregoing technical solutions.
Further, the current user information comprises user image information of the person to be detected; correspondingly, before the step of judging whether the person to be detected is located in a preset blacklist person management library according to the current user information, the step of obtaining the current face image of the person to be detected and comparing the current face image with the user image information is added; and judging whether the current face image is consistent with the user image information, if so, judging whether the personnel to be detected is located in a preset blacklist personnel management library according to the current user information. "to perfect the information authentication of the person to be detected.
As shown in fig. 2, the method comprises the following specific steps:
s210, obtaining the current user information of the person to be detected.
The current user information also comprises user image information of the person to be detected. The user image information can be face image information of a person to be detected; the user image information can be obtained by scanning the face image in the related certificate of the person to be detected through the scanning equipment. Wherein the associated document may be a passport of the user.
S220, judging whether the person to be detected passes information authentication or not based on a preset information management library according to the current user information;
and S230, acquiring a current face image of the person to be detected, and comparing the current face image with the user image information.
The current face image may be an image obtained by performing face recognition on a person to be detected. The current face image of the person to be detected can be acquired through an image acquisition device, for example, the image acquisition device can be a camera.
For example, a current face image of a person to be detected may be acquired through an image acquisition device, and the current face image is compared with user image information based on the acquired current user information of the person to be detected. The comparison result of the current face image and the user image information is used for judging whether the current information authentication is carried out on the person to be detected, namely judging whether the information counterfeiting problem exists in the person to be detected.
And S240, judging whether the current face image is consistent with the user image information.
And judging whether the current face image is consistent with the user image information, if the current face image is inconsistent with the user image information, considering that the information authentication of the personnel to be detected fails, and intervening by related staff to further determine the identity information of the personnel to be detected.
It should be noted that, in order to further improve the safety of the in-and-out detection of the person to be detected, the detection of the person to be detected may further include the detection of the area to be detected.
In an optional embodiment, the current user information further includes information of an area to be traveled of the person to be detected; correspondingly, before judging whether the person to be detected is located in the preset blacklist person management library according to the current user information, the method further comprises the following steps: judging whether the region to be visited is located in a preset region blacklist or not according to the region to be visited information of the person to be detected; if not, judging whether the personnel to be detected is located in a preset blacklist personnel management library or not according to the current user information.
The area blacklist can be predetermined by the related technical personnel and can be updated regularly according to the actual situation of each area. Illustratively, judging whether the to-be-visited area is located in a preset area blacklist or not according to the to-be-visited area information of the to-be-detected person, and if so, prohibiting the to-be-detected person from visiting the to-be-visited area; if not, judging whether the personnel to be detected is located in a preset blacklist personnel management library or not according to the current user information. This optional embodiment is through treating the regional information of waiting to detect the personnel, judges to wait to go to the mode that whether the region is located predetermined regional blacklist, has realized treating the further authentication that detects personnel's discrepancy, has improved the security that detects personnel's discrepancy.
In an optional embodiment, after determining whether the to-be-visited area is located in a preset area blacklist according to the to-be-visited area information of the to-be-detected person, the method further includes: if the area to be visited is located in a preset area blacklist, sending a prompt message to prompt a person to be detected to forbid visiting the area to be visited; determining a target file of the area to be traveled based on the association relation between the preset area and the file according to the area name of the area to be traveled and a preset legal file library; and acquiring preset target file keywords, and displaying the target file keywords for the to-be-detected personnel to check the reason for forbidding going.
Wherein the reminder may be predetermined by the skilled person, for example, the reminder may be "the area has been prohibited from traveling". The statutory document library may be predetermined by a related technician, and the statutory document library may include statutory documents corresponding to prohibited entrance and exit of each region in the region blacklist. The association relationship between each region and the file may be predetermined by a related technician, for example, the association relationship may be established between the region name and the statute file corresponding to the region, and the statute file associated with the region may be obtained by determining the region name. The target file may be a full text statute file associated with the target area, and the target area may be an area to which the user to be detected is going. The full document of the statute may include a statute enforcement period of the area, an area prohibited entry and exit starting time, an area prohibited entry and exit ending time, a related area notice, an area prohibited reason, and the like.
For example, if the to-be-traveled area of the to-be-detected user is located in the preset area blacklist, a prompt message can be sent to the to-be-detected user to prompt the to-be-detected person to prohibit traveling to the to-be-traveled area; and acquiring a statute file associated with the area through the area name of the area to be visited based on a preset statute file library, and taking the statute file as a target file. The method comprises the steps of presetting keywords of each statutory full-text file, obtaining preset keywords of a target file after the target file is determined, and displaying the keywords of the target file for a person to be detected to check reasons for forbidding going. The target file keywords may include a reason for prohibiting the area, prohibited time, open time, and the like. The target file keywords, the prompt messages and the like can be displayed on the detection device, and the detection device can be provided with a scanner, a camera, a display screen and the like. The personnel that wait to detect can go out the entry and exit through detection device before going out the entry and exit and detect.
In an optional embodiment, after displaying the target file keyword, the method further includes: and responding to a file full text acquisition request of a person to be detected, and displaying the target file. The person to be detected can request to acquire the full-text statute file corresponding to the region and display the acquired full-text statute file, or the full-text statute file is sent to the terminal equipment of the person to be detected, so that the person to be detected can know the relevant policies, prohibition reasons and the like of the region in more detail.
In an optional embodiment, facial image information of at least one person in and out in the in and out detection area may be collected by at least one image collection device; judging whether the collected people coming in and going out are located in a preset blacklist people management library or not according to the collected face image information of the people coming in and going out, if so, automatically acquiring personal information, archive information, case associated information, social information and the like related to the people coming in and going out, sending the personal information, the archive information, the case associated information, the social information and the like to related terminals of workers, and prompting the related workers to search for the people coming in and going out; if not, the relevant information of the person who goes in and out does not need to be displayed.
In the optional embodiment, the target file to be forwarded to the area is determined based on the association relationship between the preset area and the file according to the area name of the area to be forwarded to and the preset legal document library; and acquiring preset target file keywords, and displaying the target file keywords for the to-be-detected personnel to check the reason for forbidding going. According to the scheme, the reason why the person to be detected is forbidden to go to the area to be detected can be further known by the way of displaying the target file gateway detection and/or the target file to the person to be detected, and convenience is provided for the person to be detected to determine whether to take a further countermeasure subsequently.
And S250, if yes, judging whether the personnel to be detected is located in a preset blacklist personnel management library or not according to the current user information.
And S260, if not, determining that the entrance and exit detection of the person to be detected passes.
According to the scheme of the embodiment, the current face image of the person to be detected is obtained, and the current face image is compared with the user image information; and judging whether the current face image is consistent with the user image information, if so, judging whether the personnel to be detected is located in a preset blacklist personnel management library according to the current user information. According to the scheme, the determination of whether the current information verification is carried out on the person to be detected is realized by judging whether the current face image is consistent with the user image information, so that the condition of information counterfeiting of the person to be detected is further judged. By means of information authentication and the mode of judging whether the person is located in the blacklist person management library, automatic detection of entrance and exit of a person to be detected is achieved, detection efficiency and detection accuracy are improved, and the situation that loss is caused to the society or related persons due to inaccurate manual judgment is avoided.
EXAMPLE III
Fig. 3 is a schematic flow chart of a method for detecting entrance and exit of a person provided in the third embodiment of the present application, and the third embodiment of the present application provides a preferred implementation manner based on the technical solutions of the above embodiments.
S301, scanning related certificates of a person to be detected through scanning equipment, and acquiring current user information of the person to be detected, wherein the current user information comprises coding information, user image information and information of an area to be visited;
s302, judging whether the coded information of the person to be detected is located in a preset information management library or not based on the preset information management library according to the current user information, if so, executing S303A, and if not, executing S303B;
S303A, acquiring the current face image of the person to be detected through image acquisition equipment, and comparing the current face image with user image information;
S303B, determining that the person to be detected does not pass the information authentication;
s304, judging whether the current face image is consistent with the user image information, if so, executing S305A, otherwise, executing S305B;
S305A, judging whether the region to be visited is located in a preset region blacklist or not according to the region information to be visited of the person to be detected, if so, executing S306A, and if not, executing S306B;
S305B, the current face image fails to be compared with the user image information, and the person to be detected does not pass in and out detection;
S306A, sending prompt information to the person to be detected, prompting the person to be detected to forbid to go to the area to be detected, and continuing to execute S307;
S306B, judging whether the personnel to be detected is located in a preset blacklist personnel management library or not according to the current user information, if so, executing S309A, and if not, executing S309B;
s307, determining a target file of the area to be traveled based on the association relation between the preset area and the file according to the area name of the area to be traveled and a preset legal document library;
s308, acquiring preset target file keywords, displaying the target file keywords for the detected personnel to check the reason for forbidding going, and continuing to execute S309A;
S309A, determining that the detection of the entrance and the exit of the person to be detected does not pass;
and S309B, determining that the person to be detected passes the entrance and exit detection.
Example four
Fig. 4 is a schematic structural diagram of a device for detecting entrance and exit of people according to a fourth embodiment of the present application. The personnel that this application embodiment provided come in and go out detection device, the device can be applicable to and carry out the condition of safety inspection to the personnel of immigrating, and the device can adopt the mode of software and/or hardware to realize. As shown in fig. 4, the apparatus specifically includes: an information acquisition module 401, an information authentication judgment module 402, a blacklist personnel judgment module 403 and an access detection determination module 404. Wherein the content of the first and second substances,
the information acquisition module 401 is configured to acquire current user information of a person to be detected;
an information authentication judging module 402, configured to judge, according to the current user information, whether the to-be-detected person passes information authentication based on a preset information management library;
a blacklist person judgment module 403, configured to judge, if the to-be-detected person passes the information authentication, whether the to-be-detected person is located in a preset blacklist person management library according to the current user information;
an access detection determining module 404, configured to determine that access detection of a person to be detected passes if the person to be detected is not located in a preset blacklist person management library.
The method comprises the steps of obtaining current user information of a person to be detected; judging whether the person to be detected passes information authentication or not based on a preset information management library according to the current user information; if yes, judging whether the personnel to be detected is located in a preset blacklist personnel management library or not according to the current user information; and if not, determining that the in-out detection of the person to be detected passes. According to the scheme, the mode that whether the person to be detected passes the information authentication or not and whether the person to be detected is located in the blacklist person management library or not is judged, multiple times of automatic detection of the person to be detected is achieved, information screening is conducted step by step, the detection efficiency and the detection accuracy are improved, and the situation that the social or related persons are lost due to inaccurate manual judgment is avoided.
Optionally, the current user information includes coded information of the to-be-detected person;
correspondingly, the information authentication judgment module includes:
and the information authentication judging unit is used for judging whether the coded information of the person to be detected is located in a preset information management library, and if so, determining that the person to be detected passes the information authentication.
Optionally, the current user information includes user image information of the person to be detected;
correspondingly, the device further comprises:
the image information comparison module is used for acquiring a current face image of the person to be detected before judging whether the person to be detected is located in a preset blacklist person management library according to the current user information, and comparing the current face image with the user image information;
and the image information judging module is used for judging whether the current face image is consistent with the user image information or not, and if so, judging whether the personnel to be detected is located in a preset blacklist personnel management library or not according to the current user information.
Optionally, the current user information includes information of a region to be visited of the person to be detected;
correspondingly, the device further comprises:
the regional blacklist judging module is used for judging whether the to-be-visited region is located in a preset regional blacklist according to the to-be-visited region information of the to-be-visited region before judging whether the to-be-detected person is located in a preset blacklist according to the current user information;
and if the region to be visited is not located in a preset region blacklist, judging whether the personnel to be detected is located in a preset blacklist personnel management library or not according to the current user information.
Optionally, the apparatus further comprises:
the region prompting module is used for sending prompting information to prompt the to-be-detected person to forbid to go to the to-be-go region if the to-be-go region is in a preset region blacklist according to the to-be-go region information of the to-be-detected person;
the target file determining module is used for determining a target file of the area to be traveled based on the association relation between the preset area and the file according to the area name of the area to be traveled and a preset legal file library;
and the keyword acquisition module is used for acquiring preset target file keywords and displaying the target file keywords so that the personnel to be detected can check the reason for forbidding going.
Optionally, the apparatus further comprises:
and the target file display module is used for responding to the file full text acquisition request of the personnel to be detected and displaying the target file after the target file keywords are displayed.
The personnel access detection device can execute the personnel access detection method provided by any embodiment of the application, and has the corresponding functional modules and beneficial effects of executing the personnel access detection method.
EXAMPLE five
Fig. 5 is a schematic structural diagram of an electronic device according to a fifth embodiment of the present application. Fig. 5 illustrates a block diagram of an exemplary electronic device 500 suitable for use in implementing embodiments of the present application. The electronic device 500 shown in fig. 5 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 5, the electronic device 500 is embodied in the form of a general purpose computing device. The components of the electronic device 500 may include, but are not limited to: one or more processors or processing units 501, a system memory 502, and a bus 503 that couples the various system components (including the system memory 502 and the processing unit 501).
Bus 503 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, or a local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Electronic device 500 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by electronic device 500 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 502 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)504 and/or cache memory 505. The electronic device 500 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 506 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 5, commonly referred to as a "hard drive"). Although not shown in FIG. 5, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to the bus 503 by one or more data media interfaces. Memory 502 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the application.
A program/utility 508 having a set (at least one) of program modules 507 may be stored, for instance, in memory 502, such program modules 507 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. Program modules 507 generally perform the functions and/or methodologies of embodiments described herein.
The electronic device 500 may also communicate with one or more external devices 509 (e.g., keyboard, pointing device, display 510, etc.), with one or more devices that enable a user to interact with the electronic device 500, and/or with any devices (e.g., network card, modem, etc.) that enable the electronic device 500 to communicate with one or more other computing devices. Such communication may occur via input/output (I/O) interfaces 511. Also, the electronic device 500 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the Internet) via the network adapter 512. As shown, the network adapter 512 communicates with the other modules of the electronic device 500 over the bus 503. It should be appreciated that although not shown in FIG. 5, other hardware and/or software modules may be used in conjunction with the electronic device 500, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processing unit 501 executes various functional applications and data processing by running programs stored in the system memory 502, for example, to implement a method for detecting people entering and exiting provided by the embodiments of the present application.
EXAMPLE six
The sixth embodiment of the present application further provides a storage medium containing computer-executable instructions, where the storage medium stores a computer program, and when the program is executed by a processor, the method for detecting person entry and exit provided in the sixth embodiment of the present application is implemented, where the method includes: acquiring current user information of a person to be detected; judging whether the person to be detected passes information authentication or not based on a preset information management library according to the current user information; if yes, judging whether the personnel to be detected is located in a preset blacklist personnel management library or not according to the current user information; and if not, determining that the in-out detection of the person to be detected passes.
The computer storage media of the embodiments of the present application may take any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present application and the technical principles employed. It will be understood by those skilled in the art that the present application is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the application. Therefore, although the present application has been described in more detail with reference to the above embodiments, the present application is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present application, and the scope of the present application is determined by the scope of the appended claims.

Claims (10)

1. A method for detecting entry and exit of a person, comprising:
acquiring current user information of a person to be detected;
judging whether the personnel to be detected passes information authentication or not based on a preset information management library according to the current user information;
if yes, judging whether the personnel to be detected is located in a preset blacklist personnel management library or not according to the current user information;
and if not, determining that the in-out detection of the personnel to be detected passes.
2. The method according to claim 1, wherein the current user information comprises coded information of the person to be detected;
correspondingly, according to the current user information, based on a preset information management library, judging whether the personnel to be detected passes the information authentication, including:
and judging whether the coded information of the personnel to be detected is located in a preset information management library, and if so, determining that the personnel to be detected passes information authentication.
3. The method according to claim 1, wherein the current user information includes user image information of the person to be detected;
correspondingly, before judging whether the person to be detected is located in a preset blacklist person management library according to the current user information, the method further comprises the following steps:
acquiring a current face image of the person to be detected, and comparing the current face image with the user image information;
and judging whether the current face image is consistent with the user image information, if so, judging whether the to-be-detected person is located in a preset blacklist person management library according to the current user information.
4. The method according to claim 1, wherein the current user information includes information of areas to be traveled by the person to be detected;
correspondingly, before judging whether the person to be detected is located in a preset blacklist person management library according to the current user information, the method further comprises the following steps:
judging whether the to-be-visited area is located in a preset area blacklist or not according to the to-be-visited area information of the to-be-detected person;
and if not, judging whether the personnel to be detected is located in a preset blacklist personnel management library or not according to the current user information.
5. The method according to claim 4, after determining whether the to-be-visited area is located in a preset area blacklist according to the to-be-visited area information of the to-be-detected person, further comprising:
if so, sending a prompt message to prompt the person to be detected to forbid to go to the area to be gone;
determining a target file of the area to be traveled based on a preset association relation between the area and the file according to the area name of the area to be traveled and a preset legal file library;
and acquiring preset target file keywords, and displaying the target file keywords for the to-be-detected personnel to check the reason for forbidding going.
6. The method of claim 5, further comprising, after displaying the target document keyword:
and responding to the file full text acquisition request of the to-be-detected person, and displaying the target file.
7. A person entry and exit detection device, comprising:
the information acquisition module is used for acquiring the current user information of the personnel to be detected;
the information authentication judging module is used for judging whether the personnel to be detected passes the information authentication or not based on a preset information management library according to the current user information;
the blacklist personnel judgment module is used for judging whether the personnel to be detected is located in a preset blacklist personnel management library or not according to the current user information if the personnel to be detected passes the information authentication;
and the access detection determining module is used for determining that the access detection of the personnel to be detected passes if the personnel to be detected is not located in a preset blacklist personnel management library.
8. The apparatus according to claim 7, wherein the current user information comprises coded information of the person to be detected;
correspondingly, the information authentication judgment module includes:
and the information authentication determining unit is used for judging whether the coded information of the person to be detected is located in a preset information management library, and if so, determining that the person to be detected passes the information authentication.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor, when executing the program, implements the person entry and exit detection method according to any one of claims 1 to 6.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the person entry and exit detection method according to any one of claims 1 to 6.
CN202111496653.XA 2021-12-09 2021-12-09 Personnel access detection method, device, equipment and storage medium Active CN114187696B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111496653.XA CN114187696B (en) 2021-12-09 2021-12-09 Personnel access detection method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111496653.XA CN114187696B (en) 2021-12-09 2021-12-09 Personnel access detection method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN114187696A true CN114187696A (en) 2022-03-15
CN114187696B CN114187696B (en) 2024-02-02

Family

ID=80542862

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111496653.XA Active CN114187696B (en) 2021-12-09 2021-12-09 Personnel access detection method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114187696B (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070046426A1 (en) * 2005-08-26 2007-03-01 Kabushiki Kaisha Toshiba Admittance management system and admittance management method
CN101599186A (en) * 2008-06-06 2009-12-09 深圳市特种证件研究制作中心 Traveler self-help transit control system
US20110167001A1 (en) * 2010-01-07 2011-07-07 The Western Union Company Geodictionary
CN102812498A (en) * 2010-03-23 2012-12-05 凯拔格伦仕慈股份有限公司 Access control device
US20180103348A1 (en) * 2015-05-08 2018-04-12 David Thomas Malone Physical Security System and Method
CN108009728A (en) * 2017-12-05 2018-05-08 深圳春沐源控股有限公司 Regional security management method and system in park
CN108399665A (en) * 2018-01-03 2018-08-14 平安科技(深圳)有限公司 Method for safety monitoring, device based on recognition of face and storage medium
CN108629259A (en) * 2017-03-17 2018-10-09 北京旷视科技有限公司 Identity identifying method and device and storage medium
CN112102541A (en) * 2020-09-21 2020-12-18 Oppo广东移动通信有限公司 Authority determining method and device based on UWB
CN112652107A (en) * 2020-11-13 2021-04-13 江苏汉德天坤数字技术有限公司 Entry-exit security inspection system
CN112802252A (en) * 2020-12-31 2021-05-14 江苏中邦建通科技有限公司 Intelligent building safety management method, system and storage medium based on Internet of things
CN113129494A (en) * 2019-12-30 2021-07-16 深圳东沅科技有限公司 Region management method and device based on face recognition and terminal equipment
CN113240846A (en) * 2021-04-26 2021-08-10 联仁健康医疗大数据科技股份有限公司 Visitor service management method and device, electronic equipment and storage medium

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070046426A1 (en) * 2005-08-26 2007-03-01 Kabushiki Kaisha Toshiba Admittance management system and admittance management method
CN101599186A (en) * 2008-06-06 2009-12-09 深圳市特种证件研究制作中心 Traveler self-help transit control system
US20110167001A1 (en) * 2010-01-07 2011-07-07 The Western Union Company Geodictionary
CN102812498A (en) * 2010-03-23 2012-12-05 凯拔格伦仕慈股份有限公司 Access control device
US20180103348A1 (en) * 2015-05-08 2018-04-12 David Thomas Malone Physical Security System and Method
CN108629259A (en) * 2017-03-17 2018-10-09 北京旷视科技有限公司 Identity identifying method and device and storage medium
CN108009728A (en) * 2017-12-05 2018-05-08 深圳春沐源控股有限公司 Regional security management method and system in park
CN108399665A (en) * 2018-01-03 2018-08-14 平安科技(深圳)有限公司 Method for safety monitoring, device based on recognition of face and storage medium
CN113129494A (en) * 2019-12-30 2021-07-16 深圳东沅科技有限公司 Region management method and device based on face recognition and terminal equipment
CN112102541A (en) * 2020-09-21 2020-12-18 Oppo广东移动通信有限公司 Authority determining method and device based on UWB
CN112652107A (en) * 2020-11-13 2021-04-13 江苏汉德天坤数字技术有限公司 Entry-exit security inspection system
CN112802252A (en) * 2020-12-31 2021-05-14 江苏中邦建通科技有限公司 Intelligent building safety management method, system and storage medium based on Internet of things
CN113240846A (en) * 2021-04-26 2021-08-10 联仁健康医疗大数据科技股份有限公司 Visitor service management method and device, electronic equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
朱建新;李成华;张翔立;吴海标;张新访;: "电子护照验证系统研究", 计算机系统应用, no. 04 *

Also Published As

Publication number Publication date
CN114187696B (en) 2024-02-02

Similar Documents

Publication Publication Date Title
US11386515B2 (en) Mobile customs declaration validation system and method
WO2021073163A1 (en) Method and system for controlling validity of qr code, and computer device and storage medium
EP2544137A1 (en) Immigration control system
CN101828203B (en) System for screening people and method for carrying out a screening process
CN109461233A (en) Caller management method, system, computer equipment and storage medium
CN110224992B (en) Method, apparatus, system and computer readable medium for shared resource restriction reuse
CN109377611A (en) Caller management method, system, computer equipment and storage medium based on bio-identification
CN113918894A (en) Authority management method and authority management device
US20220262184A1 (en) Property management systems
CN111125656B (en) Service processing method and device and electronic equipment
US10210684B2 (en) System and method for identity verification in a detention environment
CN114187696B (en) Personnel access detection method, device, equipment and storage medium
CN109034439B (en) Intelligent visitor system based on two-dimensional code reservation type
CN109726883B (en) Risk management and control method, device and equipment for insurance business and storage medium
CN111599085B (en) Identity verification processing method and device and mobile terminal
CN112069231B (en) User information processing method and device, storage medium and electronic equipment
WO2021192227A1 (en) Detection device, detection method, and computer-readable recording medium
CN117251860A (en) Security control method and device for accessing object, electronic equipment and medium
CN116113943A (en) System and method for managing user identity data
CN115955314A (en) One-key login method, device, terminal and storage medium for billing
CN116563982A (en) Laboratory access right control method and device based on electronic door lock
CN113112619A (en) Ticket checking method, ticket checking equipment, system and storage medium for online ticket card
JP2003304338A (en) Visitor-identifying system
CN113505374A (en) Information acquisition range detection method and device, electronic equipment and medium
CN115393895A (en) School bus safety management method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant