CN114241648A - Access control method, device and equipment - Google Patents

Access control method, device and equipment Download PDF

Info

Publication number
CN114241648A
CN114241648A CN202111431420.1A CN202111431420A CN114241648A CN 114241648 A CN114241648 A CN 114241648A CN 202111431420 A CN202111431420 A CN 202111431420A CN 114241648 A CN114241648 A CN 114241648A
Authority
CN
China
Prior art keywords
identification information
identity identification
recognized
people
face images
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111431420.1A
Other languages
Chinese (zh)
Inventor
陈卓
金晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Dahua Technology Co Ltd
Original Assignee
Zhejiang Dahua Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Dahua Technology Co Ltd filed Critical Zhejiang Dahua Technology Co Ltd
Priority to CN202111431420.1A priority Critical patent/CN114241648A/en
Publication of CN114241648A publication Critical patent/CN114241648A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The application relates to an access control method, a device and equipment, wherein the method comprises the following steps: acquiring first identity identification information provided by a plurality of persons to be identified; under the condition that the first identity identification information is determined to be legal identity identification information, acquiring face images of the plurality of people to be identified; under the condition that the face images of the multiple persons to be recognized are respectively matched with images in a preset face image set, second identity identification information corresponding to the face images of the multiple persons to be recognized is obtained; and determining whether to pass the plurality of persons to be identified according to the first identity identification information and/or the second identity identification information. The access control method provided by the embodiment of the application is characterized in that the legal identities of a plurality of people to be identified are verified at least through three layers of gates, so that the strictness of access control and the safety of access places are improved.

Description

Access control method, device and equipment
Technical Field
The application relates to the technical field of entrance guard, in particular to an entrance guard control method, an entrance guard control device and entrance guard control equipment.
Background
Many people entrance guard means that carry out identification to a plurality of personnel simultaneously, and under the condition that a plurality of personnel all had the business turn over authority of discernment, open entrance guard, let pass this a plurality of personnel.
In the related technology, the control mode of multi-person access control is mainly to identify the faces, fingerprints, access control cards and the like of a plurality of persons one by one, and open access control release personnel after the identities of all the persons are successfully identified. However, the identification methods such as fingerprint and access card have certain insecurity, for example, access using other people's access cards. The human face has certain similarity, and the human face recognition has certain error, so that the illegal entering person can be recognized as a legal person similar to the human face.
Therefore, a need exists in the related art for a safer access control method.
Disclosure of Invention
The embodiment of the application provides an access control method, an access control device and access control equipment, and aims to at least solve the problem that access control in the related art is unsafe.
In a first aspect, an embodiment of the present application provides an access control method, including:
acquiring first identity identification information provided by a plurality of persons to be identified;
under the condition that the first identity identification information is determined to be legal identity identification information, acquiring face images of the plurality of people to be identified;
under the condition that the face images of the multiple persons to be recognized are respectively matched with images in a preset face image set, second identity identification information corresponding to the face images of the multiple persons to be recognized is obtained;
and determining whether to pass the plurality of persons to be identified according to the first identity identification information and/or the second identity identification information.
According to the access control method provided by the embodiment of the application, first identity identification information provided by a person to be recognized is verified, and under the condition that the first identity identification information is legal identity identification information, face images of the plurality of persons to be recognized are obtained. And under the condition that the face image is determined to be matched with the face in the preset face image set, respectively acquiring second identity identification information corresponding to the face image. And finally, determining whether the plurality of people to be identified are allowed to pass according to the first identity identification information and/or the second identity identification information. The access control method provided by the embodiment of the application is characterized in that the legal identities of a plurality of people to be identified are verified at least through three layers of gates, so that the strictness of access control and the safety of access places are improved.
Optionally, in an embodiment of the present application, the determining whether to let the plurality of people to be identified pass according to the first identity information and/or the second identity information includes:
displaying the face images of the plurality of people to be recognized and second identity identification information respectively corresponding to the face images;
receiving the correlation results between the face images of the plurality of people to be recognized and the second identity identification information;
and determining to release the plurality of people to be identified under the condition that the correlation result is determined to be correct.
Optionally, in an embodiment of the application, the displaying the face images of the multiple people to be recognized and the second identification information respectively corresponding to the face images includes:
the method comprises the steps of displaying face images of a plurality of people to be recognized in a first area, displaying second identity identification information corresponding to the face images respectively in a second area, wherein the face images and/or the second identity identification information are draggable controls. Optionally, in an embodiment of the present application, the determining whether to let the plurality of people to be identified pass according to the first identity information and/or the second identity information includes:
and under the condition that the first identity identification information provided by the plurality of persons to be recognized is determined to be matched with the second identity identification information respectively corresponding to the face images of the plurality of persons to be recognized, the plurality of persons to be recognized are determined to be released.
Optionally, in an embodiment of the present application, the acquiring first identity information provided by a plurality of people to be identified includes:
scanning and acquiring a signal name of a wireless network signal, wherein the signal name comprises a preset identifier and first identity identification information.
Optionally, in an embodiment of the present application, the acquiring the face images of the multiple people to be recognized includes:
acquiring a target image comprising at least part of the plurality of persons to be identified;
at least one face image is detected from the target image.
Optionally, in an embodiment of the present application, the obtaining the face images of the multiple people to be recognized when it is determined that the first identity information is legal identity information includes:
under the condition that the first identity identification information is determined to meet the following conditions, acquiring the face images of the multiple persons to be recognized: the number of the first identity identification information is the same as the number of the persons to be identified, and the first identity identification information is legal identity identification information.
Optionally, in an embodiment of the present application, the first identity information and the second identity information include at least one of the following information: name, job number, contact phone, identity ID.
In a second aspect, an embodiment of the present application provides an access control apparatus, including:
the first identity identification acquisition module is used for acquiring first identity identification information provided by a plurality of persons to be identified;
the face image acquisition module is used for acquiring face images of the plurality of people to be recognized under the condition that the plurality of people to be recognized are legal to come in and go out according to the first identity identification information;
the second identity identification acquisition module is used for acquiring second identity identification information corresponding to the face images of the plurality of people to be recognized respectively under the condition that the face images of the plurality of people to be recognized are respectively matched with the images in a preset face image set;
and the release determining module is used for determining whether to release the plurality of people to be identified according to the first identity identification information and/or the second identity identification information.
In a third aspect, an embodiment of the present application provides an access control apparatus, including: a processor, a camera device and a memory, wherein the camera device and the memory are respectively electrically connected with the processor,
the processor is used for executing the access control method in any one of the embodiments;
the camera device is used for acquiring the face images of the plurality of people to be identified;
the memory is used for storing the preset human face image set and second identity identification information corresponding to each human face image in the preset human face image set.
Optionally, in an embodiment of the present application, the access control device further includes a display and/or a wireless signal scanning device, wherein,
the display is used for displaying the face images of the plurality of people to be identified and second identity identification information respectively corresponding to the face images;
correspondingly, the processor is further configured to receive an association result between the face images of the multiple persons to be recognized and the second identification information, and determine to release the multiple persons to be recognized if the association result is determined to be correct;
the wireless signal scanning device is used for scanning and acquiring a signal name of a wireless network signal, wherein the signal name comprises a preset identifier and first identity identification information.
In a fourth aspect, an embodiment of the present application provides a non-transitory computer-readable storage medium, on which computer program instructions are stored, and the computer program instructions, when executed by a processor, implement the access control method.
In a fifth aspect, a computer program product in an embodiment of the present application includes computer readable codes or a non-volatile computer readable storage medium carrying computer readable codes, where when the computer readable codes are executed in a processor of an electronic device, the processor in the electronic device executes the access control method.
In a sixth aspect, a chip in an embodiment of the present application includes at least one processor, where the processor is configured to execute a computer program or computer instructions stored in a memory to execute the access control method.
The details of one or more embodiments of the application are set forth in the accompanying drawings and the description below to provide a more thorough understanding of the application.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a scene schematic diagram of an access control method provided in an embodiment of the present application;
fig. 2 is a schematic flow chart of an access control method provided in the embodiment of the present application;
FIG. 3 is a schematic diagram of a user interface provided by an embodiment of the present application;
FIG. 4 is a schematic diagram of an application scenario provided in an embodiment of the present application;
FIG. 5 is a schematic diagram of a user interface provided by an embodiment of the present application;
FIG. 6 is a schematic diagram of a user interface provided by an embodiment of the present application;
fig. 7 is a schematic block structure diagram of an access control device provided in the embodiment of the present application;
fig. 8 is a schematic block structure diagram of an access control device provided in an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be described and illustrated below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments provided in the present application without any inventive step are within the scope of protection of the present application. Moreover, it should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of ordinary skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms referred to herein shall have the ordinary meaning as understood by those of ordinary skill in the art to which this application belongs. Reference to "a," "an," "the," and similar words throughout this application are not to be construed as limiting in number, and may refer to the singular or the plural. The present application is directed to the use of the terms "including," "comprising," "having," and any variations thereof, which are intended to cover non-exclusive inclusions; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or elements, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. Reference to "connected," "coupled," and the like in this application is not intended to be limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. Reference herein to "a plurality" means greater than or equal to two. "and/or" describes an association relationship of associated objects, meaning that three relationships may exist, for example, "A and/or B" may mean: a exists alone, A and B exist simultaneously, and B exists alone. Reference herein to the terms "first," "second," "third," and the like, are merely to distinguish similar objects and do not denote a particular ordering for the objects.
Fig. 1 shows a schematic view of an application scenario of various embodiments of the present application. As shown in fig. 1, the access control device 100 identifies a plurality of persons to be identified 110 at the same time. The access control device 100 may release the plurality of people 110 to be identified when it is determined that the plurality of people 110 to be identified are legal persons to enter or exit. It should be noted that the implementation subject of each embodiment of the present application may include the access control device 100, or may also include a remote server, where the remote server may include a cloud server, a distributed server, and the like, and the present application is not limited herein.
Fig. 1 is a flowchart of a method according to an embodiment of an access control method provided in the present application, and as shown in fig. 1, the method includes:
s101: first identity identification information provided by a plurality of persons to be identified is acquired.
In this embodiment of the application, the plurality of persons to be identified may provide the first identity information. The first identity information may be identity information for uniquely identifying a person to be identified. For example, for a company employee, the first identity information may include at least one of: name, job number, contact phone, identity ID, etc.
In one embodiment of the present application, the person to be identified may transmit the first identity information via a wireless signal. The wireless signals may include WiFi, bluetooth, NFC, and the like. In a specific example, the person to be identified may open a personal client, and start a personal hotspot function in the client, and set a signal name of the personal hotspot to include the first identity identification information. The client may include, for example, a mobile smart phone, a computer (including laptop, desktop), a tablet electronic device, a Personal Digital Assistant (PDA), or a smart wearable device, among others. The personal hotspot can utilize the personal client of the person to be identified to realize the function of the wireless router, so that the devices capable of connecting the wireless network can scan the personal hotspot of the person to be identified. Based on the identification information, whether the first identification information of the person to be identified is legal identification information or not can be determined through the scanned signal name of the personal hotspot. In another embodiment, the person to be identified may also set the signal name of bluetooth as the first identity information.
In practical application, for the wireless signals which are commonly used, such as WiFi and bluetooth, the wireless signals of the person to be identified can be scanned, and meanwhile, the wireless signals of other users can also be scanned. For example, when a personal hotspot of a person to be identified is scanned, other personal hotspots and wireless network signals can be scanned. Based on this, it can be set that the signal name includes a preset identifier, and the preset identifier can include any character or character string with identification function. In one example, the signal name may be set to a special format such as "# # job # #", "# identity ID". Fig. 3 shows the names of the scanned wireless signals, and a personal hotspot in which three wireless signals come from the person to be identified can be screened according to the format of "# # job # #".
In another embodiment of the present application, the first identity information of the person to be identified may also be obtained through a wireless network device. In some examples, the wireless network device may include a router, a wireless network card, or other network device capable of providing a wireless network to other terminals. In this embodiment, the wireless network device may be disposed in an access control device. In an actual use scenario, the multiple persons to be identified may set the device names of the clients to include the first identity information. Of course, a preset identifier may also be added to the set device name, and the specific implementation may refer to the above embodiment, which is not described herein again.
Of course, in other embodiments, the person to be identified may also provide the first identity information through manual input, identity credential sensing, and the like, which is not limited herein.
S103: and acquiring the face images of the plurality of people to be recognized under the condition that the first identity identification information is legal identity identification information.
In the embodiment of the application, after the first identity identification information provided by the plurality of people to be identified is acquired, whether the first identity identification information is legal identity identification information or not can be verified. Specifically, the identification information of the legal person can be prestored, and based on this, the first identification information of the plurality of persons to be identified can be compared with the prestored legal identification information to verify whether the first identification information is legal identification information.
In another embodiment of the present application, the face images of the multiple persons to be recognized may also be acquired when it is determined that the following conditions are simultaneously satisfied: the number of the first identity identification information is the same as the number of the persons to be identified, and the first identity identification information is legal identity identification information. The number of the people to be identified may be the number of people reported by the user in advance, for example, when a plurality of people need to enter a meeting room to participate in a meeting, the number of people needing to enter may be counted in advance, and the corresponding number of people may be input through the client or the access control device. Of course, an area may be divided at the entrance guard, and the number of people located in the area may be obtained and used as the number of people of the plurality of people to be identified. The specific acquiring mode can be, for example, capturing images in an area through a camera, including an infrared camera and other devices, and detecting the number of people from the captured images, and the mode of acquiring the number of people is not limited in the present application.
Then, under the condition that the first identity identification information is determined to be legal identity identification information, face images of the multiple persons to be identified can be acquired, so that whether the persons to be identified are legal persons to come in and go out or not is further determined in a face identification mode. In an embodiment of the present application, the acquiring the face images of the multiple people to be recognized may include:
s201: acquiring a target image comprising at least part of the plurality of persons to be identified;
s203: at least one face image is detected from the target image.
In this embodiment of the application, a target image of a scene may be first acquired, where the target image may include at least part of the plurality of people to be identified. Optionally, all of the plurality of persons to be identified may be included in the target image. In an embodiment of the application, a target area can be divided at an entrance guard, the target area can be labeled by using a landmark, for example, and under the condition that a plurality of people to be recognized perform entrance guard recognition, the plurality of people to be recognized can be prompted to enter the target area so as to acquire target images of all the people to be recognized. The method specifically can utilize the camera device on the access control equipment to collect the target image, and can also utilize the independent camera equipment installed at the access control to collect the target image, and the method is not limited herein. In an embodiment of the present application, after the target image is acquired, at least one face image may be detected from the target image, for example, a neural network algorithm such as Cascade CNN, MTCNN, and the like may be used, which is not limited herein. After at least one face image in the target image is detected, the at least one face image can be cut out from the target image. For example, in the neural network algorithm, after the face images are detected, the at least one face image may be framed using a bounding box (bounding box), respectively, and thus the at least one face image may be cropped according to the bounding box.
In the embodiment, the target images of at least part of the people to be recognized are collected, so that the face images of the people to be recognized can be rapidly acquired, and the access control efficiency is improved. Of course, in other embodiments, the face images of the multiple to-be-recognized persons may also be collected respectively, for example, the multiple to-be-recognized persons may collect the face images through the personal clients respectively and upload the face images, and the method for obtaining the face images of the multiple to-be-recognized persons is not limited in this application.
S105: and under the condition that the face images of the plurality of people to be recognized are respectively matched with the images in the preset face image set, acquiring second identity identification information respectively corresponding to the face images of the plurality of people to be recognized.
In the embodiment of the application, after the face images of the multiple persons to be recognized are acquired, the face images of the persons to be recognized can be respectively matched with images in a preset face image set. The preset face image set may include face images of people who pass in and out legally, and the face images of people who pass in and out legally may include identification photos, and the like, which is not limited herein. Under the condition that the facial images of the multiple persons to be recognized are respectively matched with any image in the preset facial image set, the accuracy of identity verification of the multiple persons to be recognized can be further improved.
In the embodiment of the application, under the condition that the face images of the multiple persons to be recognized are respectively matched with the images in the preset face image set, second identity identification information respectively corresponding to the face images of the multiple persons to be recognized can be obtained. In this embodiment, the second identification information may be used to uniquely identify an identity of a lawful access user, and may include at least one of the following: name, job number, contact phone, identity ID, etc. The second identification information may be stored in a one-to-one correspondence relationship with the images in the preset face image set, so that, when it is determined that the face image of the person to be recognized matches the images in the preset face image set, the corresponding second identification information may be acquired according to the matched images. Fig. 4 shows a flowchart for obtaining the second identification information. As shown in fig. 4, after the face images 401 of the multiple persons to be recognized are acquired, the face images 401 may be matched with images in a preset face image set 403. After matching, the face images 405 matching the face images 401 are respectively obtained. Moreover, according to the association relationship between the face image 405 and the second identification information, the second identification information 407 respectively corresponding to the face image 405 may be determined.
It should be noted that the first identity information and the second identity information may be the same or different, for example, the first identity information may be a work number, the second identity information may be identity ID information, and the second identity information may be more private and more secure than the first identity information.
S107: and determining whether to pass the plurality of persons to be identified according to the first identity identification information and/or the second identity identification information.
After first identity identification information provided by the multiple persons to be identified and second identity identification information respectively corresponding to the face images of the persons to be identified are acquired, whether the multiple persons to be identified are released or not can be determined according to the first identity identification information and/or the second identity identification information. In an embodiment of the application, the determining whether to release the plurality of people to be identified according to the first identity information and/or the second identity information may include:
SS 1: and under the condition that the first identity identification information provided by the plurality of persons to be recognized is determined to be matched with the second identity identification information respectively corresponding to the face images of the plurality of persons to be recognized, the plurality of persons to be recognized are determined to be released.
In this embodiment of the application, the first identity information and the second identity information may be matched, and specifically, whether the first identity information and the second identity information are matched may be determined by a correspondence relationship between a plurality of pieces of identity information stored in advance. For example, for the job numbers of three people to be recognized in fig. 3, it is determined that the face images of the three people to be recognized are matched with the images in the preset face image set through face recognition, and then the identity IDs (i.e., the second identity information) corresponding to the three matched images in the preset face image set are respectively obtained. As shown in table 1, by comparing the three job numbers with the three ID IDs, it can be determined that there is a correspondence between the three job numbers and the three ID IDs.
Table 1 correspondence table of first identification information and second identification information
First identity identification information (job number) Second identification Information (ID)
2789567 010XXX6215
6756310 320XXX7224
0092779 623XXX0058
Further, in an embodiment of the present application, it may also be determined to release the plurality of people to be identified if the following condition is satisfied: the first identity identification information provided by the multiple persons to be identified is matched with the second identity identification information respectively corresponding to the face images of the multiple persons to be identified, and the number of the first identity identification information is the same as that of the face images. That is, in this step, the number of face images and the number of first identity identification information may be further matched, so that the matching of the number of people is further ensured, and a person is prevented from suddenly joining the plurality of people to be recognized in the middle.
In the embodiment of the application, whether the multiple persons to be recognized are legal persons can be determined by using the correlation result between the face images of the multiple persons to be recognized and the second identity information. Specifically, the determining whether to let the plurality of people to be identified pass according to the first identity information and/or the second identity information may include:
s301: displaying the face images of the plurality of people to be recognized and second identity identification information respectively corresponding to the face images;
s303: receiving the correlation results between the face images of the plurality of people to be recognized and the second identity identification information;
s305: and determining to release the plurality of people to be identified under the condition that the correlation result is determined to be correct.
In this application embodiment, can with a plurality of treat discernment personnel's facial image with the second identification information that facial image corresponds respectively shows, for example, can show on entrance guard's control device's the display. Of course, in order to make the sequence of the face image and the second identification information random, the face image and the second identification information may be displayed after being completely scrambled. Then, the plurality of people to be recognized may associate the displayed face image with the second identification information. Of course, there are various ways of association, and in a case that the display has a touch function, the person to be recognized may slide the face image or the second identification information to a designated position, so that the face image and the second identification information are associated. In another example, the multiple persons to be recognized may also connect the corresponding face images and the second identification information by lines to generate an association relationship between the face images and the second identification information, and the specific association manner is not limited in the present application. After the face images and the second identity identification information are associated, the multiple persons to be recognized can obtain association results, and the multiple persons to be recognized are determined to be released under the condition that the association results are determined to be correct.
In an embodiment of the application, the face images of the multiple persons to be recognized can be displayed in a first area, second identification information respectively corresponding to the face images is displayed in a second area, and the face images and/or the second identification information are draggable controls. The way in which the person to be recognized associates the face image with the second identification information is described below by a specific example. As shown in fig. 5, in the user interface 500, the face images 401 of the persons to be identified are shown in the upper half of the display, the second identification information is shown in the lower half of the display, and a blank area 501 for placing the face images is provided. In the user interface 500, a face image 401 is a draggable control, and by dragging the face image 401, the face image can be moved to any position in the user interface 500. Through dragging of each person to be recognized, the face image of the person can be moved to a position matched with the second identification information, and finally, a user interface 600 as shown in fig. 6 is formed. If the second identification information on the left side in the user interface 600 matches the face image on the right side, it may be determined that the multiple people to be recognized are legal people to come in and go out, and the multiple people to be recognized are released.
According to the access control method provided by the embodiment of the application, first identity identification information provided by a person to be recognized is verified, and under the condition that the first identity identification information is legal identity identification information, face images of the plurality of persons to be recognized are obtained. And under the condition that the face image is determined to be matched with the face in the preset face image set, respectively acquiring second identity identification information corresponding to the face image. And finally, determining whether the plurality of people to be identified are allowed to pass according to the first identity identification information and/or the second identity identification information. The access control method provided by the embodiment of the application is characterized in that the legal identities of a plurality of people to be identified are verified at least through three layers of gates, so that the strictness of access control and the safety of access places are improved.
In another aspect of the present application, there is provided an access control apparatus, as shown in fig. 7, the access control apparatus 700 may include:
a first identity obtaining module 701, configured to obtain first identity information provided by multiple people to be identified;
a face image obtaining module 703, configured to obtain face images of the multiple people to be recognized when it is determined that the multiple people to be recognized are legal people to enter and exit according to the first identity identification information;
a second identity obtaining module 705, configured to obtain second identity information corresponding to the face images of the multiple persons to be recognized respectively when it is determined that the face images of the multiple persons to be recognized respectively match with images in a preset face image set;
a release determining module 707, configured to determine whether to release the multiple persons to be identified according to the first identity information and/or the second identity information.
An embodiment of the present application provides an access control device 100, as shown in fig. 8, the access control device 100 may include: a processor, a camera device and a memory, wherein the camera device and the memory are respectively electrically connected with the processor,
the processor is configured to perform the method of any one of the above embodiments;
the camera device is used for acquiring the face images of the plurality of people to be identified;
the memory is used for storing the preset human face image set and second identity identification information corresponding to each human face image in the preset human face image set.
Optionally, in an embodiment of the present application, the access control device further includes a display and/or a wireless signal scanning device, wherein,
the display is used for displaying the face images of the plurality of people to be identified and second identity identification information respectively corresponding to the face images;
correspondingly, the processor is further configured to receive an association result between the face images of the multiple persons to be recognized and the second identification information, and determine to release the multiple persons to be recognized if the association result is determined to be correct;
the wireless signal scanning device is used for scanning and acquiring a signal name of a wireless network signal, wherein the signal name comprises a preset identifier and first identity identification information.
Embodiments of the present application provide a computer program product comprising computer readable code, or a non-transitory computer readable storage medium carrying computer readable code, which when run in a processor of an electronic device, the processor in the electronic device performs the above method.
The computer readable storage medium may be a tangible device that can hold and store the instructions for use by the instruction execution device. The computer readable storage medium may be, for example, but not limited to, an electronic memory device, a magnetic memory device, an optical memory device, an electromagnetic memory device, a semiconductor memory device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a Read-Only Memory (ROM), an erasable Programmable Read-Only Memory (EPROM or flash Memory), a Static Random Access Memory (SRAM), a portable Compact Disc Read-Only Memory (CD-ROM), a Digital Versatile Disc (DVD), a Memory stick, a floppy disk, a mechanical coding device, a punch card or an in-groove protrusion structure, for example, having instructions stored thereon, and any suitable combination of the foregoing.
The computer readable program instructions or code described herein may be downloaded to the respective computing/processing device from a computer readable storage medium, or to an external computer or external storage device via a network, such as the internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. The network adapter card or network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in the respective computing/processing device.
The computer program instructions for carrying out operations of the present application may be assembler instructions, Instruction Set Architecture (ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The computer-readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of Network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider). In some embodiments, the electronic circuitry can execute computer-readable program instructions to implement aspects of the present application by utilizing state information of the computer-readable program instructions to personalize custom electronic circuitry, such as Programmable Logic circuits, Field-Programmable Gate arrays (FPGAs), or Programmable Logic Arrays (PLAs).
Various aspects of the present application are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer-readable program instructions.
These computer-readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer-readable program instructions may also be stored in a computer-readable storage medium that can direct a computer, programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer-readable medium storing the instructions comprises an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer, other programmable apparatus or other devices implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
It is also noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by hardware (e.g., a Circuit or an ASIC) for performing the corresponding function or action, or by combinations of hardware and software, such as firmware.
While the invention has been described in connection with various embodiments, other variations to the disclosed embodiments can be understood and effected by those skilled in the art in practicing the claimed invention, from a review of the drawings, the disclosure, and the appended claims. In the claims, the word "comprising" does not exclude other elements or steps, and the word "a" or "an" does not exclude a plurality. A single processor or other unit may fulfill the functions of several items recited in the claims. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
Having described embodiments of the present application, the foregoing description is intended to be exemplary, not exhaustive, and not limited to the disclosed embodiments. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein is chosen in order to best explain the principles of the embodiments, the practical application, or improvements made to the technology in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.

Claims (13)

1. An access control method, comprising:
acquiring first identity identification information provided by a plurality of persons to be identified;
under the condition that the first identity identification information is determined to be legal identity identification information, acquiring face images of the plurality of people to be identified;
under the condition that the face images of the multiple persons to be recognized are respectively matched with images in a preset face image set, second identity identification information corresponding to the face images of the multiple persons to be recognized is obtained;
and determining whether to pass the plurality of persons to be identified according to the first identity identification information and/or the second identity identification information.
2. The access control method according to claim 1, wherein the determining whether to allow the plurality of people to be identified according to the first identity information and/or the second identity information includes:
displaying the face images of the plurality of people to be recognized and second identity identification information respectively corresponding to the face images;
receiving the correlation results between the face images of the plurality of people to be recognized and the second identity identification information;
and determining to release the plurality of people to be identified under the condition that the correlation result is determined to be correct.
3. The access control method according to claim 2, wherein the displaying of the face images of the plurality of people to be recognized and the second identification information corresponding to the face images respectively comprises:
the method comprises the steps of displaying face images of a plurality of people to be recognized in a first area, displaying second identity identification information corresponding to the face images respectively in a second area, wherein the face images and/or the second identity identification information are draggable controls.
4. The access control method according to claim 1, wherein the determining whether to allow the plurality of people to be identified according to the first identity information and/or the second identity information includes:
and under the condition that the first identity identification information provided by the plurality of persons to be recognized is determined to be matched with the second identity identification information respectively corresponding to the face images of the plurality of persons to be recognized, the plurality of persons to be recognized are determined to be released.
5. The access control method of claim 1, wherein the obtaining first identity information provided by a plurality of people to be identified comprises:
scanning and acquiring a signal name of a wireless network signal, wherein the signal name comprises a preset identifier and first identity identification information.
6. The access control method according to claim 1, wherein the obtaining of the face images of the plurality of people to be recognized comprises:
acquiring a target image comprising at least part of the plurality of persons to be identified;
at least one face image is detected from the target image.
7. The access control method according to claim 1, wherein the obtaining the face images of the plurality of people to be recognized under the condition that the first identification information is determined to be legal identification information comprises:
under the condition that the first identity identification information is determined to meet the following conditions, acquiring the face images of the multiple persons to be recognized: the number of the first identity identification information is the same as the number of the persons to be identified, and the first identity identification information is legal identity identification information.
8. The door access control method according to claim 1, wherein the first identification information and the second identification information include at least one of the following information: name, job number, contact phone, identity ID.
9. An access control device, comprising:
the first identity identification acquisition module is used for acquiring first identity identification information provided by a plurality of persons to be identified;
the face image acquisition module is used for acquiring face images of the plurality of people to be recognized under the condition that the plurality of people to be recognized are legal to come in and go out according to the first identity identification information;
the second identity identification acquisition module is used for acquiring second identity identification information corresponding to the face images of the plurality of people to be recognized respectively under the condition that the face images of the plurality of people to be recognized are respectively matched with the images in a preset face image set;
and the release determining module is used for determining whether to release the plurality of people to be identified according to the first identity identification information and/or the second identity identification information.
10. An access control device, comprising: a processor, a camera device and a memory, wherein the camera device and the memory are respectively electrically connected with the processor,
the processor configured to perform the method of any one of the preceding claims 1-8;
the camera device is used for acquiring the face images of the plurality of people to be identified;
the memory is used for storing the preset human face image set and second identity identification information corresponding to each human face image in the preset human face image set.
11. The access control device of claim 10, further comprising a display and/or a wireless signal scanning device, wherein,
the display is used for displaying the face images of the plurality of people to be identified and second identity identification information respectively corresponding to the face images;
correspondingly, the processor is further configured to receive an association result between the face images of the multiple persons to be recognized and the second identification information, and determine to release the multiple persons to be recognized if the association result is determined to be correct;
the wireless signal scanning device is used for scanning and acquiring a signal name of a wireless network signal, wherein the signal name comprises a preset identifier and first identity identification information.
12. A computer program product comprising computer readable code or a non-transitory computer readable storage medium carrying computer readable code which, when run in a processor of an electronic device, the processor in the electronic device performs the method of any of claims 1-8.
13. A chip comprising at least one processor for executing a computer program or computer instructions stored in a memory for performing the method of any of the preceding claims 1-8.
CN202111431420.1A 2021-11-29 2021-11-29 Access control method, device and equipment Pending CN114241648A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111431420.1A CN114241648A (en) 2021-11-29 2021-11-29 Access control method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111431420.1A CN114241648A (en) 2021-11-29 2021-11-29 Access control method, device and equipment

Publications (1)

Publication Number Publication Date
CN114241648A true CN114241648A (en) 2022-03-25

Family

ID=80751754

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111431420.1A Pending CN114241648A (en) 2021-11-29 2021-11-29 Access control method, device and equipment

Country Status (1)

Country Link
CN (1) CN114241648A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114792451A (en) * 2022-06-22 2022-07-26 深圳市海清视讯科技有限公司 Information processing method, device, and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017080434A1 (en) * 2015-11-10 2017-05-18 陆晨燕 Intelligent building monitoring method based on face recognition
CN106710032A (en) * 2015-11-13 2017-05-24 北京奇虎科技有限公司 Entrance guard opening method and device
CN110738769A (en) * 2019-09-19 2020-01-31 日立楼宇技术(广州)有限公司 forbidden user identification method, device, system and computer equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017080434A1 (en) * 2015-11-10 2017-05-18 陆晨燕 Intelligent building monitoring method based on face recognition
CN106710032A (en) * 2015-11-13 2017-05-24 北京奇虎科技有限公司 Entrance guard opening method and device
CN110738769A (en) * 2019-09-19 2020-01-31 日立楼宇技术(广州)有限公司 forbidden user identification method, device, system and computer equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114792451A (en) * 2022-06-22 2022-07-26 深圳市海清视讯科技有限公司 Information processing method, device, and storage medium

Similar Documents

Publication Publication Date Title
US10628571B2 (en) Systems and methods for high fidelity multi-modal out-of-band biometric authentication with human cross-checking
CN110073407B (en) Face image processing method and face image processing apparatus
US11496471B2 (en) Mobile enrollment using a known biometric
KR20160025768A (en) Attendance Management System Using Face Recognition
US10282532B2 (en) Secure storage of fingerprint related elements
WO2016080995A1 (en) Methods and systems for accessing a secure system
US20220046012A1 (en) Method and System for Verifying the Identity of a User
CN109902611B (en) Target certificate detection method and device and terminal equipment
JP6961555B2 (en) Entry / exit management system
WO2017173640A1 (en) Method and apparatus for recognizing individuals based on multi-mode biological recognition information
CN112767586A (en) Passage detection method and device, electronic equipment and computer readable storage medium
CN107872560A (en) The management method and device of terminal authorization
CN112767585A (en) Passage detection method and device, electronic equipment and computer readable storage medium
CN110765851A (en) Registration method, device and equipment
CN110084213B (en) Face image processing method and device
CN114612986A (en) Detection method, detection device, electronic equipment and storage medium
CN114241648A (en) Access control method, device and equipment
JP2019102024A (en) Event hall face registration system
Anbalagan et al. Trusted application using biometrics for android environment
Bodepudi et al. Cloud-Based Biometric Authentication Techniques for Secure Financial Transactions: A Review
US11611552B2 (en) Method for verifying an operator in a security system
JP2007226741A (en) Face collation system
US11704398B1 (en) Real-world object-based image authentication method and system
WO2016058540A1 (en) Identity authentication method and apparatus and storage medium
CN112637241A (en) Client authentication system and authentication method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination